高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于博弈论的移动Ad hoc网络入侵检测模型

李奕男 钱志鸿 刘影 张旭

李奕男, 钱志鸿, 刘影, 张旭. 基于博弈论的移动Ad hoc网络入侵检测模型[J]. 电子与信息学报, 2010, 32(9): 2245-2248. doi: 10.3724/SP.J.1146.2010.00225
引用本文: 李奕男, 钱志鸿, 刘影, 张旭. 基于博弈论的移动Ad hoc网络入侵检测模型[J]. 电子与信息学报, 2010, 32(9): 2245-2248. doi: 10.3724/SP.J.1146.2010.00225
Li Yi-Nan, Qian Zhi-Hong, Liu Ying, Zhang Xu. An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory[J]. Journal of Electronics and Information Technology, 2010, 32(9): 2245-2248. doi: 10.3724/SP.J.1146.2010.00225
Citation: Li Yi-Nan, Qian Zhi-Hong, Liu Ying, Zhang Xu. An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory[J]. Journal of Electronics and Information Technology, 2010, 32(9): 2245-2248. doi: 10.3724/SP.J.1146.2010.00225

基于博弈论的移动Ad hoc网络入侵检测模型

doi: 10.3724/SP.J.1146.2010.00225
基金项目: 

教育部高等学校博士学科点专项科研基金(20090061110043)和国家自然科学基金( 60940010)资助课题

An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory

  • 摘要: 随着计算机技术尤其是网络技术的发展,人们面临着由于入侵而带来的一系列安全问题。该文将博弈理论引入到移动Ad hoc网络入侵检测系统中,建立网络安全博弈模型,经过理论推导和仿真实验得到该模型的纳什均衡解。实验结果表明,该模型有效地提高了检测率,降低了误检测率,网络开销较小,证明该方法的有效性和可行性。
  • 朱建明, Srinivasan Raghunathan. 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2009, 32(4): 828-834.Zhu Jian-ming and Srinivasan Raghunathan. Evaluation model of information security technologies based on game theoretic[J].Chinese Journal of Computers.2009, 32(4):828-834[2]Ryu Y U and Rhee H S. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and Systems Security, 2008, 11(4): 20.1-20.24.[3]Musman S and Flesher P. System or security managers adaptive response tool [C]. DARPA Information Survivability Conference and Exposition 2000, Hilton Head, USA, 2000, Vol.2: 1056-1060.[4]丁勇, 虞平, 龚俭. 自动入侵响应系统的研究[J].计算机科学.2003, 30(10):160-166Ding Yong, Yu Ping, and Gong Jian. A study of automated intrusion response systems [J]. Computer Science, 2003, 30(10): 160-166.[5]Carver C, Hill J M, and Surdu J R. A methodology for using intelligent agents to provide automated intrusion response[C]. The IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000: 110-116.Ragsdale D.[J].Carver C, and Humphries J, et al.. Adaptation techniques for intrusion detection and intrusion response system[C]. The IEEE Intl Conf on Systems, Man, and Cybernetics at Nashville, Tennessee.2000,:-[6]Lee W, Fan W, and Miller M, et al.. Toward cost-sensitive modeling for intrusion detection and response [J]. Journal of Computer Security, 2002, 10(1/2): 5-22.[7]Foo B.[J].Wu Y, and Mao Y, et al.. ADEPTS: adaptive intrusion response using attack graphs in an E-commerce environment[C]. Intl Conf on Dependable Systems and Networks (DSN05), Washington.2005,:-[8]Lye K and Wing J M. Game strategies in network security[C]. The 2002 IEEE Computer Security Foundations Workshop, Copenhagan, Denmark, 2002: 71-86.[9]Xu J and Lee W. Sustaining availability of Web services under distributed denial of service attacks [J].IEEE Transactions on Computer.2003, 52(4):195-208[10][美]艾里克拉斯缪森. 王晖等译. 博弈与信息博弈论概论. 北京: 北京大学出版社, 2003: 385-417.[11]董武世, 孙强, 柯宗武, 陈年生. 基于博弈论的Ad hoc网络功率控制模型[J]. 武汉理工大学学报, 2009, 31(17): 114-122.Dong Wu-shi, Sun Qiang, Ke Zong-wu, and Chen Nian-sheng. Power control model based on game theory in Ad hoc networks[J]. Journal of Wuhan University of Technology, 2009, 31(17): 114-122.[12]Ns2 network simulation[OL]http ://www.isi.edu/nsnam/ns , 2009.
  • 加载中
计量
  • 文章访问数:  3102
  • HTML全文浏览量:  22
  • PDF下载量:  1321
  • 被引次数: 0
出版历程
  • 收稿日期:  2010-03-11
  • 修回日期:  2010-05-25
  • 刊出日期:  2010-09-19

目录

    /

    返回文章
    返回

    官方微信,欢迎关注