Modeling Attacks on MANET Using an Incomplete Repeated Bayesian Game

被引:0
|
作者
Saab, Farah [1 ]
Awad, Mariette [1 ]
机构
[1] Amer Univ Beirut, Elect & Comp Engn Dept, Beirut, Lebanon
关键词
D O I
10.1007/978-3-319-11310-4_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, individuals, as well as corporations, use the internet on a daily basis to send and receive emails, browse the internet, perform financial transactions, etc... However, this dependence comes with the huge risk of communicating over a network that has been compromised. Network administrators are constantly faced with new and improved security attacks that might result in significant losses. Only recently have game theoretic approaches found their way into the area of network security. In this paper we discuss the different types of security attacks while focusing on a general attack that resembles attacks on mobile ad hoc networks or MANETs. We model the attack as a Bayesian repetitive game with incomplete information between a malicious node and a normal node. We study the Nash equilibria of the game, and describe several punishment strategies. Finally, we show the results of our simulations where an equilibrium state is always reached and the average profit of normal nodes always significantly exceeds that of malicious nodes.
引用
收藏
页码:269 / 288
页数:20
相关论文
共 50 条
  • [1] Multi-Path TCP Incomplete Information Repeated Bayesian Game
    Shamani, Mohammad Javad
    Rezaei, Saeid
    Seneviratne, Aruna
    Kebriaei, Hamed
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [2] Defending Link Flooding Attacks under Incomplete Information: A Bayesian Game Approach
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Wang, Xianbin
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [3] Bayesian learning in repeated games of incomplete information
    Nachbar, JH
    [J]. SOCIAL CHOICE AND WELFARE, 2001, 18 (02) : 303 - 326
  • [4] A Stochastic Bayesian Game for Securing Secondary Frequency Control of Microgrids Against Spoofing Attacks with Incomplete Information
    Li, Yang
    Liu, Shichao
    Zhu, Li
    [J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2 : 118 - 129
  • [5] Bayesian learning in repeated games of incomplete information
    John H. Nachbar
    [J]. Social Choice and Welfare, 2001, 18 : 303 - 326
  • [6] Dynamical Analysis of a Repeated Game with Incomplete Information
    Bressaud, Xavier
    Quas, Anthony
    [J]. MATHEMATICS OF OPERATIONS RESEARCH, 2017, 42 (04) : 1085 - 1105
  • [7] Modeling Incomplete Knowledge of Semantic Web Using Bayesian Networks
    Fareh, Messaouda
    [J]. APPLIED ARTIFICIAL INTELLIGENCE, 2019, 33 (11) : 1022 - 1034
  • [8] Using Bayesian networks to model the belief in the opponent in static game with incomplete information
    Wang, XF
    Liu, WY
    Li, J
    Zhao, Y
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 249 - 252
  • [9] Modeling Attribution of Cyber Attacks Using Bayesian Belief Networks
    Sharma, Munish
    [J]. STRATEGIC ANALYSIS, 2021, 45 (01) : 18 - 37
  • [10] An experimental study of the repeated trust game with incomplete information
    Anderhub, V
    Engelmann, D
    Güth, W
    [J]. JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2002, 48 (02) : 197 - 216