Advertisement

Wireless Personal Communications

, Volume 103, Issue 3, pp 1993–2003 | Cite as

A Differential Game-Theoretic Approach for the Intrusion Prevention Systems and Attackers in Wireless Networks

  • Li Miao
  • Shuai Li
Article
  • 56 Downloads

Abstract

In this paper, we investigate the interactions between the intrusion prevention systems (IPSs) and attackers in wireless networks. We model this interactions as a non-cooperative differential game. In terms of model construction, each node is allowed to choose its optimal cost of resource consumption to contribute to the security problem depending on the state. We derive the optimal strategies for the attackers and the IPSs over time, respectively. Simulation analysis will be given to illustrate that the dynamic evolution of the defense strategy of the IPSs and the trajectory of the attackers based on the proposed scheme.

Keywords

Wireless networks Intrusion prevention systems Differential game Nash equilibrium 

Notes

References

  1. 1.
    Chowdhury, A. (2016). Recent cyber security attacks and their mitigation approaches – An Overview. In L. Batten & G. Li (Eds.), Applications and techniques in information security. Communications in computer and information science (Vol. 651, pp. 54–65). Singapore: Springer.Google Scholar
  2. 2.
    Wei, J., Zhang, R., Liu, J., et al. (2015). Defense strategy of network security based on dynamic classification. Ksii Transactions on Internet & Information Systems, 9(12), 5116–5134.Google Scholar
  3. 3.
    Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRefGoogle Scholar
  4. 4.
    Yi, P., Zhu, T., Ma, J., et al. (2013). An intrusion prevention mechanism in mobile ad hoc networks. Ad Hoc & Sensor Wireless Networks, 17(3), 269–292.Google Scholar
  5. 5.
    Butun, I., Wang, Y., Lee, Y., et al. (2012). Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks. International Journal of Security and Networks, 7(2), 107–121.CrossRefGoogle Scholar
  6. 6.
    Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRefGoogle Scholar
  7. 7.
    Demirkol, I., Alagoz, F., Deliç, H., et al. (2006). Wireless sensor networks for intrusion detection: Packet traffic modeling. IEEE Communications Letters, 10(1), 22–24.CrossRefGoogle Scholar
  8. 8.
    Fuchsberger, A. (2005). Intrusion detection systems and intrusion prevention systems. Information Security Technical Report, 10(3), 134–139.CrossRefGoogle Scholar
  9. 9.
    Rodas, O., To, M. A., Alvarez, J., et al. (2015). Protecting wireless mesh networks through a distributed intrusion prevention framework. In 2015 7th IEEE Latin-American conference on communications (LATINCOM) (pp. 1–6). IEEE.Google Scholar
  10. 10.
    Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRefGoogle Scholar
  11. 11.
    Alpcan, T., & Baar, T. (2010). Network security: A decision and game-theoretic approach. Cambridge: Cambridge University Press.Google Scholar
  12. 12.
    Agah, A., Das, S. K., Basu, K., et al. (2004). Intrusion detection in sensor networks: A non-cooperative game approach. In Network computing and applications.Google Scholar
  13. 13.
    Bedi, H. S., Roy, S., & Shiva, S. (2011). Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. In 2011 IEEE symposium on computational intelligence in cyber security (CICS) (pp. 129–136). IEEE.Google Scholar
  14. 14.
    Li, F., Yang, Y., & Wu, J. (2010). Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 40(3), 612–622.CrossRefGoogle Scholar
  15. 15.
    Yeung, D. W. K., & Petrosjan, L. A. (2006). Cooperative stochastic differential games. Berlin: Springer.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer and Communication EngineeringUniversity of Science and Technology Beijing (USTB)BeijingPeople’s Republic of China

Personalised recommendations