2014
DOI: 10.1016/j.engappai.2014.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 154 publications
(67 citation statements)
references
References 51 publications
0
66
0
1
Order By: Relevance
“…Despite the benefits offered by the use of cloud computing, it could be exploited or targeted by cybercriminals, including state-sponsored actors (see [3]). This is not surprising, as popular consumer technologies such as wireless sensor networks have also been reportedly targeted [4,5]. One common form of attacks targeting cloud computing is distributed denial of service (DDoS) attacks [6,7], and we refer to interested reader to [8] for other cloud-related security and privacy issues.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the benefits offered by the use of cloud computing, it could be exploited or targeted by cybercriminals, including state-sponsored actors (see [3]). This is not surprising, as popular consumer technologies such as wireless sensor networks have also been reportedly targeted [4,5]. One common form of attacks targeting cloud computing is distributed denial of service (DDoS) attacks [6,7], and we refer to interested reader to [8] for other cloud-related security and privacy issues.…”
Section: Introductionmentioning
confidence: 99%
“…An attacker attempts to breach security of the system to disrupt or cause damage to network services, whereas a defender obtains appropriate measures to enhance the system security design or response. In this case intrusion response systems (IRS) are necessary because intrusion prevention systems are unfeasible [17,18]. In previous work [19] game play method of finding the intruder were proposed based on the response and recovery method.…”
Section: Problem Definitionmentioning
confidence: 99%
“…The owner assumes that the (attackers) players know only their own payoff of accessing the data [18]. Furthermore, to be more efficient in responding to the noticing intrusion, it should be essential to trace down the attack source to avoid the denial of service to authorized users.…”
Section: (B) Irs Using Fuzzy Gamementioning
confidence: 99%