An Evolutionary Game-Based Mechanism for Unwanted Traffic Control
With the development of Internet technology and the pervasive use of internet service providers (ISPs), internet users have reached an unprecedented volume. However, the existence of some malicious users seriously undermine the environment of the network by distributing a large amount of unwanted traffic, such as spam, pop-up, and malwares, which can be identified with the cooperation of individual users by installing anti-virus toolkits. In our paper, we propose an evolutionary game theoretic incentive mechanism to promote the cooperation of individual users to curb the expansion of unwanted traffic. Considering the hierarchical nature of real-world management, we model our framework as hierarchical incentive mechanism and combine reward with punishment mechanism to further incentivize cooperative behavior. Meanwhile, the acceptance condition of our framework is analyzed and we carry out a number of simulations to analyze the acceptance conditions of our framework.
This work is supported by the National Science Foundation of China (Grant No. 61272173).
- 1.Al-Duwairi, B., Khater, I., & Al-Jarrah, O. (2012). Detecting image spam using image texture features. International Journal of Information Security, 2(3/4), 344–353.Google Scholar
- 4.Chen, Y., Shu, L., Crespi, N., Lee, G. M., & Guizani, M. (2016). Understanding the impact of network structure on propagation dynamics based on mobile big data. In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). https://doi.org/10.1109/iwcmc.2016.7577198.
- 14.Yan, Z., Kantola, R., & Shen, Y. (2011). Unwanted traffic control via global trust management. In 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 647–654). Piscataway: IEEE.Google Scholar
- 15.Yan, Z., Kantola, R., & Shen, Y. (2012). Unwanted traffic control via hybrid trust management. In 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 666–673). Piscataway: IEEE.Google Scholar