Guo et al., 2019 - Google Patents

A game theoretic approach to cooperative intrusion detection

Guo et al., 2019

Document ID
9397684544175684549
Author
Guo Y
Zhang H
Zhang L
Fang L
Li F
Publication year
Publication venue
Journal of computational science

External Links

Snippet

Abstract In Mobile Ad-Hoc Networks, cooperative intrusion detection is efficient and scalable to massively parallel attacks. However, due to concerns about privacy leakage and resource costs, if without enough incentives, most users are often selfish and disinterested in helping …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • H04L67/1042Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
    • H04L67/1044Group management mechanisms

Similar Documents

Publication Publication Date Title
Jin et al. Privacy-preserving crowdsourced spectrum sensing
Dahiya et al. A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense
Agah et al. Preventing DoS attacks in wireless sensor networks: A repeated game theory approach.
Liu et al. An incentive mechanism for privacy-preserving crowdsensing via deep reinforcement learning
Otrok et al. A game-theoretic intrusion detection model for mobile ad hoc networks
Qin et al. Research on trust sensing based secure routing mechanism for wireless sensor network
Mousa et al. Trust management and reputation systems in mobile participatory sensing applications: A survey
Khalid et al. Comparative study of trust and reputation systems for wireless sensor networks
Balaji et al. Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model
Guo et al. A game theoretic approach to cooperative intrusion detection
Samian et al. Cooperation stimulation mechanisms for wireless multihop networks: A survey
Guo et al. Incentive mechanism for cooperative intrusion detection: An evolutionary game approach
Huang et al. Secure roadside unit hotspot against eavesdropping based traffic analysis in edge computing based internet of vehicles
Gaur et al. Trusted and secure clustering in mobile pervasive environment
Yin et al. Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks
Mantas et al. Towards an incentive‐compatible, reputation‐based framework for stimulating cooperation in opportunistic networks: a survey
Lin et al. Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism
Tu et al. Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL
Fang et al. Incentive mechanism for cooperative authentication: An evolutionary game approach
Lin et al. A trustworthy access control model for mobile cloud computing based on reputation and mechanism design
Dwarakanath et al. Trustcep: adopting a trust-based approach for distributed complex event processing
Wang et al. The truthful evolution and incentive for large-scale mobile crowd sensing networks
Lin et al. A secure collaborative spectrum sensing strategy in cyber-physical systems
Zhang et al. A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks
Yunchuan et al. Utility-based cooperative decision in cooperative authentication