Skip to main content

2018 | OriginalPaper | Buchkapitel

Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach

verfasst von : Yunchuan Guo, Han Zhang, Lingcui Zhang, Liang Fang, Fenghua Li

Erschienen in: Computational Science – ICCS 2018

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Mobile Ad-Hoc Networks, cooperative intrusion detection is efficient and scalable to massively parallel attacks. However, due to concerns of privacy leak-age and resource costs, if without enough incentives, most mobile nodes are often selfish and disinterested in helping others to detect an intrusion event, thus an ef-ficient incentive mechanism is required. In this paper, we formulate the incentive mechanism for cooperative intrusion detection as an evolutionary game and achieve an optimal solution to help nodes decide whether to participate in detec-tion or not. Our proposed mechanism can deal with the problems that cooperative nodes do not own complete knowledge about other nodes. We develop a game algorithm to maximize nodes utility. Simulations demonstrate that our strategy can efficiently incentivize potential nodes to cooperate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Loo, J., Mauri, J.L., Ortiz, J.H.: Mobile Ad-Hoc Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016) Loo, J., Mauri, J.L., Ortiz, J.H.: Mobile Ad-Hoc Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016)
2.
Zurück zum Zitat Nadeem, A., Howarth, M.P.: An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw. 13, 368–380 (2014)CrossRef Nadeem, A., Howarth, M.P.: An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Netw. 13, 368–380 (2014)CrossRef
3.
Zurück zum Zitat Vasilomanolakis, E., Karuppayah, S., Muhlhauser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47, 1–33 (2015)CrossRef Vasilomanolakis, E., Karuppayah, S., Muhlhauser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47, 1–33 (2015)CrossRef
4.
Zurück zum Zitat Restuccia, F., Das, S.K., Payton, J.: Incentive mechanisms for participatory sensing: survey and research challenges. ACM Trans. Sens. Netw. 12, 1–40 (2016) Restuccia, F., Das, S.K., Payton, J.: Incentive mechanisms for participatory sensing: survey and research challenges. ACM Trans. Sens. Netw. 12, 1–40 (2016)
5.
Zurück zum Zitat Shu, X., Yao, D., Bertino, E.: Privacy-preserving detection of sensitive data exposure. IEEE Trans. Inf. Forensics Secur. 10, 1092–1103 (2015)CrossRef Shu, X., Yao, D., Bertino, E.: Privacy-preserving detection of sensitive data exposure. IEEE Trans. Inf. Forensics Secur. 10, 1092–1103 (2015)CrossRef
6.
Zurück zum Zitat Niksefat, S., Sadeghiyan, B., Mohassel, P., Sadeghian, S.: ZIDS: a privacy-preserving intrusion detection system using secure two-party computation protocols. Comput. J. 57, 494–509 (2014)CrossRef Niksefat, S., Sadeghiyan, B., Mohassel, P., Sadeghian, S.: ZIDS: a privacy-preserving intrusion detection system using secure two-party computation protocols. Comput. J. 57, 494–509 (2014)CrossRef
7.
Zurück zum Zitat Do, H.G., Ng, W.K.: Privacy-preserving approach for sharing and processing intrusion alert data. In: Proceedings of IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 7–9 (2015) Do, H.G., Ng, W.K.: Privacy-preserving approach for sharing and processing intrusion alert data. In: Proceedings of IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 7–9 (2015)
8.
Zurück zum Zitat Reed, J., Aviv, A.J., Wagner, D., Haeberlen, A., Pierce, B.C., Smith, J.M.: Differential privacy for collaborative security. In: Proceedings of the Third European Workshop on System Security, pp. 1–7 (2010) Reed, J., Aviv, A.J., Wagner, D., Haeberlen, A., Pierce, B.C., Smith, J.M.: Differential privacy for collaborative security. In: Proceedings of the Third European Workshop on System Security, pp. 1–7 (2010)
9.
Zurück zum Zitat Jin, R., He, X., Dai, H.: On the tradeoff between privacy and utility in collaborative intrusion detection systems - a game theoretical approach. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp (HotSoS), pp. 45–51 (2017) Jin, R., He, X., Dai, H.: On the tradeoff between privacy and utility in collaborative intrusion detection systems - a game theoretical approach. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp (HotSoS), pp. 45–51 (2017)
10.
Zurück zum Zitat Niksefat, S., Kaghazgaran, P., Sadeghiyan, B.: Privacy issues in intrusion detection systems: a taxonomy, survey and future directions. Comput. Sci. Rev. 25, 69–78 (2017)CrossRef Niksefat, S., Kaghazgaran, P., Sadeghiyan, B.: Privacy issues in intrusion detection systems: a taxonomy, survey and future directions. Comput. Sci. Rev. 25, 69–78 (2017)CrossRef
11.
Zurück zum Zitat Hassanzadeh, A., Stoleru, R.: Towards optimal monitoring in cooperative IDS for resource constrained wireless networks. In: Proceedings of IEEE ICCCN, pp. 1–8 (2011) Hassanzadeh, A., Stoleru, R.: Towards optimal monitoring in cooperative IDS for resource constrained wireless networks. In: Proceedings of IEEE ICCCN, pp. 1–8 (2011)
12.
Zurück zum Zitat Gil Perez, M., Tapiador, J.E., Clark, J.A., Martnez Perez, G., Skarmeta Gomez, A.F.: Trustworthy placements: improving quality and resilience in collaborative attack detection. Comput. Netw. 58, 70–86 (2014)CrossRef Gil Perez, M., Tapiador, J.E., Clark, J.A., Martnez Perez, G., Skarmeta Gomez, A.F.: Trustworthy placements: improving quality and resilience in collaborative attack detection. Comput. Netw. 58, 70–86 (2014)CrossRef
13.
Zurück zum Zitat Subba, B., Biswas, S., Karmakar, S.: Enhancing effectiveness of intrusion detection systems: a hybrid approach. In: Proceedings of IEEE International Conference on Advanced Networks and Telecommunications Systems, pp. 1–6 (2016) Subba, B., Biswas, S., Karmakar, S.: Enhancing effectiveness of intrusion detection systems: a hybrid approach. In: Proceedings of IEEE International Conference on Advanced Networks and Telecommunications Systems, pp. 1–6 (2016)
14.
Zurück zum Zitat Guo, Y., Fang, L., Geng, K., Yin, L., Li, F., Chen, L.: Real-time data incentives for IoT searches. In: IEEE International Conference on Communications (2018) Guo, Y., Fang, L., Geng, K., Yin, L., Li, F., Chen, L.: Real-time data incentives for IoT searches. In: IEEE International Conference on Communications (2018)
15.
Zurück zum Zitat Peng, D., Wu, F., Chen, G.: Data quality guided incentive mechanism design for crowdsensing. IEEE Trans. Mob. Comput. 17, 307–319 (2018)CrossRef Peng, D., Wu, F., Chen, G.: Data quality guided incentive mechanism design for crowdsensing. IEEE Trans. Mob. Comput. 17, 307–319 (2018)CrossRef
16.
Zurück zum Zitat Zheng, Z., Wu, F., Tang, S.: A budget feasible incentive mechanism for weighted coverage maximization in mobile crowdsensing. IEEE Trans. Mob. Comput. 16, 2392–2407 (2017)CrossRef Zheng, Z., Wu, F., Tang, S.: A budget feasible incentive mechanism for weighted coverage maximization in mobile crowdsensing. IEEE Trans. Mob. Comput. 16, 2392–2407 (2017)CrossRef
17.
Zurück zum Zitat Ma, Q., Zhang, S., Zhu, T., Liu, K., Zhang, L., He, W., Liu, Y.: PLP: protecting location privacy against correlation analyze attack in crowdsensing. IEEE Trans. Mob. Comput. 16, 2588–2598 (2017)CrossRef Ma, Q., Zhang, S., Zhu, T., Liu, K., Zhang, L., He, W., Liu, Y.: PLP: protecting location privacy against correlation analyze attack in crowdsensing. IEEE Trans. Mob. Comput. 16, 2588–2598 (2017)CrossRef
18.
Zurück zum Zitat Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of IEEE MOBILCOM, pp. 173–184 (2012) Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of IEEE MOBILCOM, pp. 173–184 (2012)
19.
Zurück zum Zitat Guo, Y., Yin, L., Liu, L., Fang, B.: Utility-based cooperative decision in cooperative authentication. In: Proceedings of IEEE INFOCOM, pp. 1006–1014 (2014) Guo, Y., Yin, L., Liu, L., Fang, B.: Utility-based cooperative decision in cooperative authentication. In: Proceedings of IEEE INFOCOM, pp. 1006–1014 (2014)
20.
Zurück zum Zitat Mukhopadhyay, J., Pal, A., Mukhopadhyay, S., Singh, V.K.: Quality adaptive online double auction in participatory sensing. J. Inform. Math. Sci. 9, 571–593 (2017) Mukhopadhyay, J., Pal, A., Mukhopadhyay, S., Singh, V.K.: Quality adaptive online double auction in participatory sensing. J. Inform. Math. Sci. 9, 571–593 (2017)
21.
Zurück zum Zitat Yin, L., Guo, Y., Li, F., Sun, Y., Qian, J., Vasilakos, A.: A game-theoretic approach to advertisement dissemination in ephemeral networks. World Wide Web J. 21, 241–260 (2018)CrossRef Yin, L., Guo, Y., Li, F., Sun, Y., Qian, J., Vasilakos, A.: A game-theoretic approach to advertisement dissemination in ephemeral networks. World Wide Web J. 21, 241–260 (2018)CrossRef
22.
Zurück zum Zitat Yu, R., Kang, J., Huang, X., Xie, S., Zhang, Y., Gjessing, S.: MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans. Dependable Secur. Comput. 13, 93–105 (2016)CrossRef Yu, R., Kang, J., Huang, X., Xie, S., Zhang, Y., Gjessing, S.: MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans. Dependable Secur. Comput. 13, 93–105 (2016)CrossRef
23.
Zurück zum Zitat Cowden, C.C.: Game theory, evolutionary stable strategies and the evolution of biological interactions. Nat. Educ. Knowl. 3, paper 6 (2012) Cowden, C.C.: Game theory, evolutionary stable strategies and the evolution of biological interactions. Nat. Educ. Knowl. 3, paper 6 (2012)
24.
Zurück zum Zitat Boyd, S.P., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)CrossRef Boyd, S.P., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)CrossRef
Metadaten
Titel
Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach
verfasst von
Yunchuan Guo
Han Zhang
Lingcui Zhang
Liang Fang
Fenghua Li
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-93698-7_7