Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory El Mehdi Kandoussi ( ) , Iman El Mir, Mohamed Hanini, and Abdelkrim Haqiq Computer, Networks, Mobility and Modeling Laboratory, Faculty of Sciences and Technology, Hassan 1st University, Settat, Morocco kandoussi.elmehdi@gmail.com, iman.08.elmir@gmail.com, haninimohamed@gmail.com, ahaqiq@gmail.com Abstract. In Cloud Computing environment, the availability, authentication and integrity became a more challenging problem. Indeed, the classical solutions of security based on intrusion detection system and firewalls are easily bypassed by experienced attackers. In addition, the use of different technologies in term of security didn’t mitigate the attack considerably. To achieve network system’s security with the complexity and the diversity of attack types is too difficult and costly. However, to make them more resistant to attacks, anomaly-based Intrusion Prevention System (IPS) are used. Such systems take into consideration the prob‐ ability of legitimacy of a packet if it didn’t match any signature of malicious packets. In this paper, a competitive normal form game is developed based on the probability of packets’ legitimacy and the trust that an IPS has over the owner of the packet. Furthermore, a decision is made about dropping, accepting or testing packet in the network, and different Nash Equilibriums are calculated based on the system’s parameters. Our approach demonstrated its feasibility in term of prediction of the cases in which the system could be compromised and the actions that should be performed in case of an intrusion. Keywords: Cloud computing · Security · Anomaly-based IPS · Game theory Nash equilibrium 1 Introduction Cloud computing has recently emerged as a well evolved computer technology area. According to the National Institute of Standards and Technology (NIST) [1] introduces cloud computing as “a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., network, servers, storage, appli‐ cations and services) that can be rapidly provisioned and released with minimal manage‐ ment effort or service provider interaction. In the last few years, Cloud Computing becomes more challenging in term of security. Furthermore, different attacks bypassed easily the static measures of security based on rules of a security policy or a signature database of malicious packets [2]. For this reason different solutions as IPS that are proactive are developed. These types of measures that not only alert in case of an attack but also suspect malicious behavior of © Springer International Publishing AG, part of Springer Nature 2018 A. Abraham et al. (Eds.): IBICA 2017, AISC 735, pp. 266–276, 2018. https://doi.org/10.1007/978-3-319-76354-5_24