Modeling Attacks on MANET Using an Incomplete Repeated Bayesian Game

被引:0
|
作者
Saab, Farah [1 ]
Awad, Mariette [1 ]
机构
[1] Amer Univ Beirut, Elect & Comp Engn Dept, Beirut, Lebanon
关键词
D O I
10.1007/978-3-319-11310-4_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, individuals, as well as corporations, use the internet on a daily basis to send and receive emails, browse the internet, perform financial transactions, etc... However, this dependence comes with the huge risk of communicating over a network that has been compromised. Network administrators are constantly faced with new and improved security attacks that might result in significant losses. Only recently have game theoretic approaches found their way into the area of network security. In this paper we discuss the different types of security attacks while focusing on a general attack that resembles attacks on mobile ad hoc networks or MANETs. We model the attack as a Bayesian repetitive game with incomplete information between a malicious node and a normal node. We study the Nash equilibria of the game, and describe several punishment strategies. Finally, we show the results of our simulations where an equilibrium state is always reached and the average profit of normal nodes always significantly exceeds that of malicious nodes.
引用
收藏
页码:269 / 288
页数:20
相关论文
共 50 条
  • [41] Bayesian Spatial Modeling of Incomplete Data with Application to HIV Prevalence in Ghana
    Prince Allotey
    Ofer Harel
    [J]. Sankhya B, 2023, 85 : 307 - 329
  • [43] Bayesian Spatial Modeling of Incomplete Data with Application to HIV Prevalence in Ghana
    Allotey, Prince
    Harel, Ofer
    [J]. SANKHYA-SERIES B-APPLIED AND INTERDISCIPLINARY STATISTICS, 2023, 85 (02): : 307 - 329
  • [44] Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information
    Zhang, Chi
    Emmanuel Ramirez-Marquez, Jose
    [J]. IIE TRANSACTIONS, 2013, 45 (03) : 244 - 258
  • [45] Uncertainty matters: Bayesian modeling of bicycle crashes with incomplete exposure data
    Xu, Pengpeng
    Bai, Lu
    Pei, Xin
    Wong, S. C.
    Zhou, Hanchu
    [J]. ACCIDENT ANALYSIS AND PREVENTION, 2022, 165
  • [46] RETRACTED ARTICLE: An efficient technique for mitigating stealthy attacks using MNDA in MANET
    D. Muruganandam
    J. Martin Leo Manickam
    [J]. Neural Computing and Applications, 2019, 31 : 15 - 22
  • [47] Retraction Note: An efficient technique for mitigating stealthy attacks using MNDA in MANET
    D. Muruganandam
    J. Martin Leo Manickam
    [J]. Neural Computing and Applications, 2023, 35 : 4189 - 4189
  • [48] A real-time demand response market through a repeated incomplete-information game
    Motalleb, Mandi
    Annaswamy, Anuradha
    Ghorbani, Reza
    [J]. ENERGY, 2018, 143 : 424 - 438
  • [49] Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method
    Zhu, Rongchen
    Hu, Xiaofeng
    Li, Xin
    Ye, Han
    Jia, Nan
    [J]. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2020, 17 (06)
  • [50] Modeling The Side-Channel Attacks in Data Deduplication with Game Theory
    Wang, Bing
    Lou, Wenjing
    Hou, Y. Thomas
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 200 - 208