期刊文献+

基于博弈论的移动Ad hoc网络入侵检测模型 被引量:12

An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory
下载PDF
导出
摘要 随着计算机技术尤其是网络技术的发展,人们面临着由于入侵而带来的一系列安全问题。该文将博弈理论引入到移动Ad hoc网络入侵检测系统中,建立网络安全博弈模型,经过理论推导和仿真实验得到该模型的纳什均衡解。实验结果表明,该模型有效地提高了检测率,降低了误检测率,网络开销较小,证明该方法的有效性和可行性。 With development of computer technology,especially Internet technology,people are faced with the invasion brought about a series of security problems. Employing game theory into a mobile Ad hoc network Intrusion Detection System (IDS) is presented in this paper. Network security game model is established,theoretical analysis and experiments of the Nash equilibrium solution of the model is yielded in this paper. Experimental results show that the model has effectively improved the detection rate and reduce the false detection rate,bringing the smaller network overhead. The effectiveness and feasibility of the method are proved.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第9期2245-2248,共4页 Journal of Electronics & Information Technology
基金 教育部高等学校博士学科点专项科研基金(20090061110043) 国家自然科学基金(60940010)资助课题
关键词 AD HOC网络 博弈论 入侵检测系统 Ad hoc network Game theory IDS (Intrusion Detection System)
  • 相关文献

参考文献13

  • 1朱建明,Srinivasan Raghunathan.基于博弈论的信息安全技术评价模型[J].计算机学报,2009,32(4):828-834. 被引量:42
  • 2Ryu Y U and Rhee H S.Evaluation of intrusion detection systems under a resource constraint.ACM Transactions on Information and Systems Security,2008,11(4):20.1-20.24.
  • 3Musman S and Flesher P.System or security managers' adaptive response tool[C].DARPA Information Survivability Conference and Exposition 2000,Hilton Head,USA,2000,Vol.2:1056-1060.
  • 4丁勇,虞平,龚俭.自动入侵响应系统的研究[J].计算机科学,2003,30(10):160-162. 被引量:11
  • 5Carver C,Hill J M,and Surdu J R.A methodology for using intelligent agents to provide automated intrusion response[C].The IEEE Systems,Man,and Cybernetics Information Assurance and Security Workshop,West Point,NY,2000:110-116.
  • 6Ragsdale D,Carver C,and Humphries J,et al..Adaptation techniques for intrusion detection and intrusion response system[C].The IEEE Int'l Conf on Systems,Man,and Cybernetics at Nashville,Tennessee,2000:1398-1406.
  • 7Lee W,Fan W,and Miller M,et al..Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):5-22.
  • 8Foo B,Wu Y,and Mao Y,et al..ADEPTS:adaptive intrusion response using attack graphs in an E-commerce environment[C].Int'l Conf on Dependable Systems and Networks (DSN'05),Washington,2005:139-146.
  • 9Lye K and Wing J M.Game strategies in network security[C].The 2002 IEEE Computer Security Foundations Workshop,Copenhagan,Denmark,2002:71-86.
  • 10Xu J and Lee W.Sustaining availability of Web services under distributed denial of service attacks[J].IEEE Transactions on Computer,2003,52(4):195-208.

二级参考文献29

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2黎宁,牛晓红.Ad hoc网络中的功率控制机制[J].重庆邮电学院学报(自然科学版),2004,16(6):26-31. 被引量:9
  • 3穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 4Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in IT security. Information Systems Research, 2005, 16(1): 28-46
  • 5Athanasiades N, Abler R, Levine Jet al. Intrusion detection testing and benehmarking methodologies//Proceedings of the 1st IEEE International Workshop on Information Assurance. Darmstadt, Germany: IEEE Computer Society, 2003: 63-72
  • 6Ulvila J W, Gaffney J E. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 2004, 1(1): 39-54
  • 7Ryu Y U, Rhee H S. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and Systems Security, 2008, 11(4):20.1 -20. 24
  • 8Sabahi F, Movaghar A. Intrusion detection: A survey//Proceedings of the 3rd International Conference on Systems and Networks Communications (ICSNC' 08). Sliema, Malta, 2008:23-26
  • 9Poe James, Li Tao. BASS: A benchmark suit for evaluating architectural security systems. ACM SIGARCH Computer Architecture News, 2006, 34(4): 26-33
  • 10Cavusoglu Huseyin, Mishra Birendra, Raghunathan Srinivasan. A model for evaluating IT security investments. Communications of the ACM, 2004, 47(7): 87-91

共引文献54

同被引文献103

引证文献12

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部