Research on hidden malicious user detection problem

被引:3
|
作者
Liu Tingting [1 ]
Shu Feng [2 ]
机构
[1] Nanjing Inst Technol, Nanjing 211167, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
cognitive radio; cooperative spectrum sensing; hidden malicious user detection; COGNITIVE RADIO;
D O I
10.1002/sec.810
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A method of detecting malicious user based on the enhanced Dempster-Shafer (D-S) algorithm for the hidden malicious user in cooperative spectrum sensing frame is proposed in this paper. The validity of this method is established by running simulations in the environment of hidden malicious user with different predefined probabilities. Compared with the original enhanced D-S algorithm, the proposed method based on enhanced D-S algorithm in this paper provides a better global sensing performance. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:958 / 963
页数:6
相关论文
共 50 条
  • [1] Detection of malicious code in user mode
    Sangeetha, R.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 146 - 149
  • [2] Malicious User Experience Design Research for Cybersecurity
    Trowbridge, Adam
    Sharevski, Filipo
    Westbrook, Jessica
    [J]. NSPW '18: PROCEEDINGS OF THE NEW SECURITY PARADIGMS WORKSHOP, 2018, : 123 - 130
  • [3] Research On Detection Of Malicious Software
    Peng, Boyuan
    [J]. 2021 2ND INTERNATIONAL CONFERENCE ON E-COMMERCE AND INTERNET TECHNOLOGY (ECIT 2021), 2021, : 400 - 403
  • [4] A New Cooperative Detection Technique with Malicious User Suppression
    Zhao, Tingting
    Zhao, Yuping
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 2754 - 2758
  • [5] An Efficient Malicious User Detection Mechanism for Crowdsensing System
    Wu, Xiaocan
    Sun, Yu-E
    Du, Yang
    Xing, Xiaoshuang
    Gao, Guoju
    Huang, He
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 507 - 519
  • [6] A Hidden Markov Model Detection of Malicious Android Applications at Runtime
    Chen, Yang
    Ghorbanzadeh, Mo
    Ma, Kevin
    Clancy, Charles
    McGwier, Robert
    [J]. 2014 23RD WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2014,
  • [7] Encrypted Malicious Traffic Detection Based on Hidden Markov Model
    Zou, Fu-Tai
    Yu, Tang-Da
    Xu, Wen-Liang
    [J]. Ruan Jian Xue Bao/Journal of Software, 2022, 33 (07): : 2683 - 2698
  • [8] Malicious User Detection in a Cognitive Radio Cooperative Sensing System
    Kaligineedi, Praveen
    Khabbazian, Majid
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (08) : 2488 - 2497
  • [9] A Robust Malicious User Detection Scheme in Cooperative Spectrum Sensing
    Chen, Changlong
    Song, Min
    Xin, Chunsheng
    Alam, Mansoor
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 4856 - 4861
  • [10] Android App Malicious Behavior Detection Based on User Intention
    Fu, JianMing
    Li, PengWei
    Lin, Yan
    Ding, Shuang
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 560 - 567