Guo et al., 2019 - Google Patents
A game theoretic approach to cooperative intrusion detectionGuo et al., 2019
- Document ID
- 9397684544175684549
- Author
- Guo Y
- Zhang H
- Zhang L
- Fang L
- Li F
- Publication year
- Publication venue
- Journal of computational science
External Links
Snippet
Abstract In Mobile Ad-Hoc Networks, cooperative intrusion detection is efficient and scalable to massively parallel attacks. However, due to concerns about privacy leakage and resource costs, if without enough incentives, most users are often selfish and disinterested in helping …
- 238000001514 detection method 0 title abstract description 101
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1042—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
- H04L67/1044—Group management mechanisms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jin et al. | Privacy-preserving crowdsourced spectrum sensing | |
Dahiya et al. | A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense | |
Agah et al. | Preventing DoS attacks in wireless sensor networks: A repeated game theory approach. | |
Liu et al. | An incentive mechanism for privacy-preserving crowdsensing via deep reinforcement learning | |
Otrok et al. | A game-theoretic intrusion detection model for mobile ad hoc networks | |
Qin et al. | Research on trust sensing based secure routing mechanism for wireless sensor network | |
Mousa et al. | Trust management and reputation systems in mobile participatory sensing applications: A survey | |
Khalid et al. | Comparative study of trust and reputation systems for wireless sensor networks | |
Balaji et al. | Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model | |
Guo et al. | A game theoretic approach to cooperative intrusion detection | |
Samian et al. | Cooperation stimulation mechanisms for wireless multihop networks: A survey | |
Guo et al. | Incentive mechanism for cooperative intrusion detection: An evolutionary game approach | |
Huang et al. | Secure roadside unit hotspot against eavesdropping based traffic analysis in edge computing based internet of vehicles | |
Gaur et al. | Trusted and secure clustering in mobile pervasive environment | |
Yin et al. | Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks | |
Mantas et al. | Towards an incentive‐compatible, reputation‐based framework for stimulating cooperation in opportunistic networks: a survey | |
Lin et al. | Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism | |
Tu et al. | Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL | |
Fang et al. | Incentive mechanism for cooperative authentication: An evolutionary game approach | |
Lin et al. | A trustworthy access control model for mobile cloud computing based on reputation and mechanism design | |
Dwarakanath et al. | Trustcep: adopting a trust-based approach for distributed complex event processing | |
Wang et al. | The truthful evolution and incentive for large-scale mobile crowd sensing networks | |
Lin et al. | A secure collaborative spectrum sensing strategy in cyber-physical systems | |
Zhang et al. | A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks | |
Yunchuan et al. | Utility-based cooperative decision in cooperative authentication |