Advanced Search
Volume 32 Issue 9
Oct.  2010
Turn off MathJax
Article Contents
Li Yi-Nan, Qian Zhi-Hong, Liu Ying, Zhang Xu. An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2245-2248. doi: 10.3724/SP.J.1146.2010.00225
Citation: Li Yi-Nan, Qian Zhi-Hong, Liu Ying, Zhang Xu. An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2245-2248. doi: 10.3724/SP.J.1146.2010.00225

An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory

doi: 10.3724/SP.J.1146.2010.00225
  • Received Date: 2010-03-11
  • Rev Recd Date: 2010-05-25
  • Publish Date: 2010-09-19
  • With development of computer technology, especially Internet technology, people are faced with the invasion brought about a series of security problems. Employing game theory into a mobile Ad hoc network Intrusion Detection System (IDS) is presented in this paper. Network security game model is established, theoretical analysis and experiments of the Nash equilibrium solution of the model is yielded in this paper. Experimental results show that the model has effectively improved the detection rate and reduce the false detection rate, bringing the smaller network overhead. The effectiveness and feasibility of the method are proved.
  • loading
  • 朱建明, Srinivasan Raghunathan. 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2009, 32(4): 828-834.Zhu Jian-ming and Srinivasan Raghunathan. Evaluation model of information security technologies based on game theoretic[J].Chinese Journal of Computers.2009, 32(4):828-834[2]Ryu Y U and Rhee H S. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and Systems Security, 2008, 11(4): 20.1-20.24.[3]Musman S and Flesher P. System or security managers adaptive response tool [C]. DARPA Information Survivability Conference and Exposition 2000, Hilton Head, USA, 2000, Vol.2: 1056-1060.[4]丁勇, 虞平, 龚俭. 自动入侵响应系统的研究[J].计算机科学.2003, 30(10):160-166Ding Yong, Yu Ping, and Gong Jian. A study of automated intrusion response systems [J]. Computer Science, 2003, 30(10): 160-166.[5]Carver C, Hill J M, and Surdu J R. A methodology for using intelligent agents to provide automated intrusion response[C]. The IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000: 110-116.Ragsdale D.[J].Carver C, and Humphries J, et al.. Adaptation techniques for intrusion detection and intrusion response system[C]. The IEEE Intl Conf on Systems, Man, and Cybernetics at Nashville, Tennessee.2000,:-[6]Lee W, Fan W, and Miller M, et al.. Toward cost-sensitive modeling for intrusion detection and response [J]. Journal of Computer Security, 2002, 10(1/2): 5-22.[7]Foo B.[J].Wu Y, and Mao Y, et al.. ADEPTS: adaptive intrusion response using attack graphs in an E-commerce environment[C]. Intl Conf on Dependable Systems and Networks (DSN05), Washington.2005,:-[8]Lye K and Wing J M. Game strategies in network security[C]. The 2002 IEEE Computer Security Foundations Workshop, Copenhagan, Denmark, 2002: 71-86.[9]Xu J and Lee W. Sustaining availability of Web services under distributed denial of service attacks [J].IEEE Transactions on Computer.2003, 52(4):195-208[10][美]艾里克拉斯缪森. 王晖等译. 博弈与信息博弈论概论. 北京: 北京大学出版社, 2003: 385-417.[11]董武世, 孙强, 柯宗武, 陈年生. 基于博弈论的Ad hoc网络功率控制模型[J]. 武汉理工大学学报, 2009, 31(17): 114-122.Dong Wu-shi, Sun Qiang, Ke Zong-wu, and Chen Nian-sheng. Power control model based on game theory in Ad hoc networks[J]. Journal of Wuhan University of Technology, 2009, 31(17): 114-122.[12]Ns2 network simulation[OL]http ://www.isi.edu/nsnam/ns , 2009.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3876) PDF downloads(1330) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return