2013 International Conference on Social Computing 2013
DOI: 10.1109/socialcom.2013.84
|View full text |Cite
|
Sign up to set email alerts
|

Game Theoretic Framework for Reputation-Based Distributed Intrusion Detection

Abstract: Host-Based Intrusion Detection Systems (HIDS) have been widely used to detect malicious behaviors of nodes in heterogenous networks. Collaborative intrusion detection can be more secure with a framework using reputation aggregation as an incentive. The problem of incentives and efficiency are well known problems that can be addressed in such collaborative environment. In this paper, we propose to use game theory to improve detection and optimize intrusion detection systems used in collaboration. The main contr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…For a single data source, we can use a collective measure of trustworthiness (in the sense of reliability) based on the referrals or ratings from members in a community to evaluate the reputation [59]. PageRank is another method for reputation measurement [60]. If we generate the dataset by data fusion of multiple data sources, an "opinion" (a metric of the degree of belief) can be generated to represent the uncertainty in the aggregated result.…”
Section: Dataset Quality Principles and Dimensionsmentioning
confidence: 99%
“…For a single data source, we can use a collective measure of trustworthiness (in the sense of reliability) based on the referrals or ratings from members in a community to evaluate the reputation [59]. PageRank is another method for reputation measurement [60]. If we generate the dataset by data fusion of multiple data sources, an "opinion" (a metric of the degree of belief) can be generated to represent the uncertainty in the aggregated result.…”
Section: Dataset Quality Principles and Dimensionsmentioning
confidence: 99%
“…For self-organizing ad hoc networks, some nodes may be malicious and how to detect the malicious actions is an important work. Some strategic games are presented to stimulate the cooperation among distinct regular nodes, based on which the hidden malicious nodes can be detected [16][17][18][19][20][21]. In [22], a two-player Stackelberg stochastic game is analyzed for achieving the best response against the intrusion.…”
Section: Introductionmentioning
confidence: 99%