{"title":"基于非合作博弈的移动自组网入侵检测建模","authors":"Dr. B. Paramasiva, K. Pitchai","doi":"10.1109/ICPRIME.2013.6496490","DOIUrl":null,"url":null,"abstract":"The vulnerable nature of the Mobile Adhoc Networks, make them open to numerous security threats which distorts their further developmental attempts, In order to overcome such scenarios in an effective way Intrusion Detection System techniques can be incorporated which will strengthen the frontline security. This paper addresses a novel intrusion detection system that uses Game theoretic model to detect the malicious nodes at an earlier stage. The Bayesian game concept of game theory have been used to model the interaction between any two neighbouring nodes of a mobile adhoc network and the game is resolved to find best strategies for the regular nodes of the network. These strategies are used as a defensive mechanism to defend against malicious attacks and also the nodes monitor their neighbours continuously and stores the information about the packets sent and received based on which the subsequent stages of the game are carried forward.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Modeling intrusion detection in mobile ad hoc networks as a non cooperative game\",\"authors\":\"Dr. B. Paramasiva, K. Pitchai\",\"doi\":\"10.1109/ICPRIME.2013.6496490\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The vulnerable nature of the Mobile Adhoc Networks, make them open to numerous security threats which distorts their further developmental attempts, In order to overcome such scenarios in an effective way Intrusion Detection System techniques can be incorporated which will strengthen the frontline security. This paper addresses a novel intrusion detection system that uses Game theoretic model to detect the malicious nodes at an earlier stage. The Bayesian game concept of game theory have been used to model the interaction between any two neighbouring nodes of a mobile adhoc network and the game is resolved to find best strategies for the regular nodes of the network. These strategies are used as a defensive mechanism to defend against malicious attacks and also the nodes monitor their neighbours continuously and stores the information about the packets sent and received based on which the subsequent stages of the game are carried forward.\",\"PeriodicalId\":123210,\"journal\":{\"name\":\"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPRIME.2013.6496490\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPRIME.2013.6496490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling intrusion detection in mobile ad hoc networks as a non cooperative game
The vulnerable nature of the Mobile Adhoc Networks, make them open to numerous security threats which distorts their further developmental attempts, In order to overcome such scenarios in an effective way Intrusion Detection System techniques can be incorporated which will strengthen the frontline security. This paper addresses a novel intrusion detection system that uses Game theoretic model to detect the malicious nodes at an earlier stage. The Bayesian game concept of game theory have been used to model the interaction between any two neighbouring nodes of a mobile adhoc network and the game is resolved to find best strategies for the regular nodes of the network. These strategies are used as a defensive mechanism to defend against malicious attacks and also the nodes monitor their neighbours continuously and stores the information about the packets sent and received based on which the subsequent stages of the game are carried forward.