The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other...
This paper addresses the solution of large zero-sum matrix games using randomized methods. We provide a procedure by which a player can compute mixed policies that, with high probability, are security policies against an adversary that is also using randomized methods to solve the game. The computational savings result from solving subgames that are much smaller than the original game and we provide...
The problem of detecting malicious nodes in wireless sensor networks is considered. Since current security mechanisms are inadequate for wireless sensor networks, we must develop a new framework to detect malicious nodes using Zero-Sum game approach and selective node acknowledgements in the forward data path. The first few sections of the paper provide a game model with probability of cost required...
We consider game theoretic models of wireless medium access control (MAC) in which each transmitter makes individual decisions regarding their power level or transmission probability. This allows for scalable distributed operation; however, it can also enable users to pursue malicious objectives such as jamming other nodes to deny them service. We study games with two types of players: selfish and...
How to quantify the threat probability in network security risk assessment is an important problem to be solved. Most of the existing methods tend to consider the attacker and defender separately. However, the decision to perform the attack is a trade-off between the gain from a successful attack and the possible consequences of detection; meanwhile, the defenderpsilas security strategy depends mostly...
In this paper, we propose a game theoretic framework for distributed intrusion detection in ad hoc networks. The proposed models capture the energy-security tradeoffs for individual monitoring and propose an energy efficient design for distributed monitoring, with probabilistic guarantees for the achieved security level in the network.
One popular solution for reducing the resource consumption of intrusion detection system (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection service to other nodes in the same cluster. However, such a moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDSs to detect and thwart...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.