Skip to main content
Erschienen in: Mobile Networks and Applications 4/2019

16.01.2019

A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism

verfasst von: Jia Liu, Mingchu Li, Muhammad Alam, Yuanfang Chen, Ting Wu

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of the Internet of Things and the pervasive use of internet service providers (ISPs), internet users and data have reached an unprecedented volume. However, the existence of malicious users seriously undermine user privacy and network security by distributing a large amount of unwanted traffic, such as spam, pop-up, and malware. This to some extent can be identified with the cooperation of individual users by installing anti-virus toolkits. However, users need to purchase such software at an additional cost. Therefore, unless built-in incentive mechanisms exist, rational users will choose not to install virus software. If enough network entities behave in this way, the network will be flooded with unwanted traffic. In this paper, we propose an evolutionary game theoretic incentive mechanism to promote the cooperation of individual users to curb the expansion of unwanted traffic. We propose a combined reward and punishment mechanism to further incentivize cooperative behavior. Meanwhile, the acceptance condition of our framework is analyzed and we carry out a number of simulations to evaluate the acceptance conditions of our framework.The experimental results indicate that our reward and punishment mechanism can efficiently incentivize users to adopt cooperative behavior and reduce unwanted traffic.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Ahmed AA, Jantan A, Wan TC (2015) Filtration model for the detection of malicious traffic in large-scale networks. Comput Commun 82:59–70CrossRef Ahmed AA, Jantan A, Wan TC (2015) Filtration model for the detection of malicious traffic in large-scale networks. Comput Commun 82:59–70CrossRef
2.
Zurück zum Zitat Al-Duwairi B, Khater I, Al-Jarrah O (2012) Detecting image spam using image texture features. Int J Inf Secur Res (IJISR) 2(3/4):344–353 Al-Duwairi B, Khater I, Al-Jarrah O (2012) Detecting image spam using image texture features. Int J Inf Secur Res (IJISR) 2(3/4):344–353
3.
Zurück zum Zitat Chen Y, Crespi N, Ortiz AM, Shu L (2017) Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Inform Sci 379:82–93CrossRef Chen Y, Crespi N, Ortiz AM, Shu L (2017) Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Inform Sci 379:82–93CrossRef
4.
Zurück zum Zitat Chen Y, Lee GM, Lei S, Crespi N (2016) Industrial internet of things-based collaborative sensing intelligence: framework and research challenges. Sensors 16(2):215CrossRef Chen Y, Lee GM, Lei S, Crespi N (2016) Industrial internet of things-based collaborative sensing intelligence: framework and research challenges. Sensors 16(2):215CrossRef
5.
Zurück zum Zitat Chen Y, Shu L, Crespi N, Lee GM, Guizani M (2016) Understanding the impact of network structure on propagation dynamics based on mobile big data, 1018–1023 Chen Y, Shu L, Crespi N, Lee GM, Guizani M (2016) Understanding the impact of network structure on propagation dynamics based on mobile big data, 1018–1023
6.
Zurück zum Zitat Fan Y, Ye Y, Chen L (2016) Malicious sequential pattern mining for automatic malware detection. Pergamon Press, Inc. Fan Y, Ye Y, Chen L (2016) Malicious sequential pattern mining for automatic malware detection. Pergamon Press, Inc.
7.
Zurück zum Zitat Hou YT, Chang Y, Chen T, Laih CS, Chen CM (2010) Malicious web content detection by machine learning. Expert Syst Appl 37(1):55–60CrossRef Hou YT, Chang Y, Chen T, Laih CS, Chen CM (2010) Malicious web content detection by machine learning. Expert Syst Appl 37(1):55–60CrossRef
8.
Zurück zum Zitat Huda S, Miah S, Yearwood J, Alyahya S, Al-Dossari H, Doss R (2018) A malicious threat detection model for cloud assisted internet of things (cot) based industrial control system (ics) networks using deep belief network. J Parallel Distrib Comput, 120 Huda S, Miah S, Yearwood J, Alyahya S, Al-Dossari H, Doss R (2018) A malicious threat detection model for cloud assisted internet of things (cot) based industrial control system (ics) networks using deep belief network. J Parallel Distrib Comput, 120
9.
Zurück zum Zitat Jiang G, Shen S, Hu K, Huang L, Li H, Han R (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sensor Netw 2015:25 Jiang G, Shen S, Hu K, Huang L, Li H, Han R (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sensor Netw 2015:25
10.
Zurück zum Zitat Jianzhong Z, Xu W, Yudi P, Xu Ji (2010) Mailtrust: a mail reputation mechanism based on improved trustguard. In: 2010 International conference on communications and mobile computing (CMC), vol 1. IEEE, pp 218–222 Jianzhong Z, Xu W, Yudi P, Xu Ji (2010) Mailtrust: a mail reputation mechanism based on improved trustguard. In: 2010 International conference on communications and mobile computing (CMC), vol 1. IEEE, pp 218–222
11.
Zurück zum Zitat Kim S, Kim J, Kang BH (2018) Malicious url protection based on attackers’ habitual behavioral analysis. Computers & Security Kim S, Kim J, Kang BH (2018) Malicious url protection based on attackers’ habitual behavioral analysis. Computers & Security
12.
Zurück zum Zitat Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25CrossRef Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25CrossRef
13.
Zurück zum Zitat Shen Y, Yan Z, Kantola R (2014) Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput Secur 47:3–25CrossRef Shen Y, Yan Z, Kantola R (2014) Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput Secur 47:3–25CrossRef
14.
Zurück zum Zitat Shu L, Chen Y, Sun Z, Tong F, et al. (2017) Detecting the dangerous area of toxic gases with wireless sensor networks. IEEE Transactions on Emerging Topics in Computing Shu L, Chen Y, Sun Z, Tong F, et al. (2017) Detecting the dangerous area of toxic gases with wireless sensor networks. IEEE Transactions on Emerging Topics in Computing
15.
Zurück zum Zitat Singh K, Guntuku SC, Thakur A, Hota C (2014) Big data analytics framework for peer-to-peer botnet detection using random forests. Inform Sci 278:488–497CrossRef Singh K, Guntuku SC, Thakur A, Hota C (2014) Big data analytics framework for peer-to-peer botnet detection using random forests. Inform Sci 278:488–497CrossRef
16.
Zurück zum Zitat Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defence framework against dos/ddos cyber attacks. Comput Secur 38:39–50CrossRef Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defence framework against dos/ddos cyber attacks. Comput Secur 38:39–50CrossRef
17.
Zurück zum Zitat Srivastava V, Neel JO, MacKenzie AB, Menon R, DaSilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutor 7(1-4):46–56CrossRef Srivastava V, Neel JO, MacKenzie AB, Menon R, DaSilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutor 7(1-4):46–56CrossRef
18.
Zurück zum Zitat Szolnoki A, Perc M (2012) Conditional strategies and the evolution of cooperation in spatial public goods games. Phys Rev E 85(2):026–104CrossRef Szolnoki A, Perc M (2012) Conditional strategies and the evolution of cooperation in spatial public goods games. Phys Rev E 85(2):026–104CrossRef
19.
Zurück zum Zitat Tian C, Yang B, Zhong J, Liu X (2014) Trust-based incentive mechanism to motivate cooperation in hybrid p2p networks. Comput Netw 73:244–255CrossRef Tian C, Yang B, Zhong J, Liu X (2014) Trust-based incentive mechanism to motivate cooperation in hybrid p2p networks. Comput Netw 73:244–255CrossRef
20.
Zurück zum Zitat Wang Y, Nakao A, Vasilakos AV, Ma J (2011) On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous p2p networks. Comput Netw 55(17):3811–3831CrossRef Wang Y, Nakao A, Vasilakos AV, Ma J (2011) On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous p2p networks. Comput Netw 55(17):3811–3831CrossRef
21.
Zurück zum Zitat Weibull JW (1997) Evolutionary game theory. MIT press Weibull JW (1997) Evolutionary game theory. MIT press
22.
Zurück zum Zitat Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In: International conference on computing, management and telecommunications, pp 289–294 Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In: International conference on computing, management and telecommunications, pp 289–294
23.
Zurück zum Zitat Xu X, Wang Q, Cao J, Wan PJ (2012) Locating malicious nodes for data aggregation in wireless networks. In: IEEE INFOCOM, pp 3056–3060 Xu X, Wang Q, Cao J, Wan PJ (2012) Locating malicious nodes for data aggregation in wireless networks. In: IEEE INFOCOM, pp 3056–3060
24.
Zurück zum Zitat Yan Z, Kantola R, Shen Y (2011) Unwanted traffic control via global trust management. In: 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 647–654 Yan Z, Kantola R, Shen Y (2011) Unwanted traffic control via global trust management. In: 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 647–654
25.
Zurück zum Zitat Yan Z, Kantola R, Shen Y (2012) Unwanted traffic control via hybrid trust management. In: 11th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 666–673 Yan Z, Kantola R, Shen Y (2012) Unwanted traffic control via hybrid trust management. In: 11th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 666–673
26.
Zurück zum Zitat Yan Z, Kantola R, Shen Y (2014) A generic solution for unwanted traffic control through trust management. Rev Hypermed Multimed 20(1):25–51CrossRef Yan Z, Kantola R, Shen Y (2014) A generic solution for unwanted traffic control through trust management. Rev Hypermed Multimed 20(1):25–51CrossRef
27.
Zurück zum Zitat Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Trans Depend Secur Comput 8(6):810–823CrossRef Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Trans Depend Secur Comput 8(6):810–823CrossRef
28.
Zurück zum Zitat Bo Z, Li Q, Ma Y (2017) Research on dynamic heuristic scanning technique and the application of the malicious code detection model. Inf Process Lett 117:19–24MathSciNetCrossRef Bo Z, Li Q, Ma Y (2017) Research on dynamic heuristic scanning technique and the application of the malicious code detection model. Inf Process Lett 117:19–24MathSciNetCrossRef
29.
Zurück zum Zitat Zhao BQ, Lui JCS, Chiu D-M (2012) A mathematical framework for analyzing adaptive incentive protocols in p2p networks. IEEE/ACM Trans Network 20(2):367–380CrossRef Zhao BQ, Lui JCS, Chiu D-M (2012) A mathematical framework for analyzing adaptive incentive protocols in p2p networks. IEEE/ACM Trans Network 20(2):367–380CrossRef
30.
Zurück zum Zitat Zheleva E, Kolcz A, Getoor L (2008) Trusting spam reporters: a reporter-based reputation system for email filtering. ACM Trans Inf Syst (TOIS) 27(1):1–37CrossRef Zheleva E, Kolcz A, Getoor L (2008) Trusting spam reporters: a reporter-based reputation system for email filtering. ACM Trans Inf Syst (TOIS) 27(1):1–37CrossRef
Metadaten
Titel
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism
verfasst von
Jia Liu
Mingchu Li
Muhammad Alam
Yuanfang Chen
Ting Wu
Publikationsdatum
16.01.2019
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2019
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1166-0

Weitere Artikel der Ausgabe 4/2019

Mobile Networks and Applications 4/2019 Zur Ausgabe

Neuer Inhalt