An Evolutionary Game-Based Mechanism for Unwanted Traffic Control

  • Jia Liu
  • Mingchu Li
  • Zitong Feng
  • Cheng Guo
  • Lifeng YuanEmail author
  • Muhammad Alam
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)


With the development of Internet technology and the pervasive use of internet service providers (ISPs), internet users have reached an unprecedented volume. However, the existence of some malicious users seriously undermine the environment of the network by distributing a large amount of unwanted traffic, such as spam, pop-up, and malwares, which can be identified with the cooperation of individual users by installing anti-virus toolkits. In our paper, we propose an evolutionary game theoretic incentive mechanism to promote the cooperation of individual users to curb the expansion of unwanted traffic. Considering the hierarchical nature of real-world management, we model our framework as hierarchical incentive mechanism and combine reward with punishment mechanism to further incentivize cooperative behavior. Meanwhile, the acceptance condition of our framework is analyzed and we carry out a number of simulations to analyze the acceptance conditions of our framework.



This work is supported by the National Science Foundation of China (Grant No. 61272173).


  1. 1.
    Al-Duwairi, B., Khater, I., & Al-Jarrah, O. (2012). Detecting image spam using image texture features. International Journal of Information Security, 2(3/4), 344–353.Google Scholar
  2. 2.
    Chen, Y., Crespi, N., Ortiz, A. M., & Shu, L. (2017). Reality mining: A prediction algorithm for disease dynamics based on mobile big data. Information Sciences, 379, 82–93.CrossRefGoogle Scholar
  3. 3.
    Chen, Y., Lee, G. M., Lei, S., & Crespi, N. (2016). Industrial Internet of things-based collaborative sensing intelligence: Framework and research challenges. Sensors, 16(2), 215.CrossRefGoogle Scholar
  4. 4.
    Chen, Y., Shu, L., Crespi, N., Lee, G. M., & Guizani, M. (2016). Understanding the impact of network structure on propagation dynamics based on mobile big data. In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
  5. 5.
    Jan, M. A., Khan, F., Alam, M., & Usman, M. (2017). A payload-based mutual authentication scheme for internet of things. Future Generation Computer Systems. Scholar
  6. 6.
    Pinyol, I., & Sabater-Mir, J. (2013). Computational trust and reputation models for open multi-agent systems: A review. Artificial Intelligence Review, 40(1), 1–25.CrossRefGoogle Scholar
  7. 7.
    Shen, Y., Yan, Z., & Kantola, R. (2014). Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Computers & Security, 47, 3–25.CrossRefGoogle Scholar
  8. 8.
    Shutters, S. T. (2012). Punishment leads to cooperative behavior in structured societies. Evolutionary Computation, 20(2), 301–319.CrossRefGoogle Scholar
  9. 9.
    Singh, K., Guntuku, S. C., Thakur, A., & Hota, C. (2014). Big data analytics framework for peer-to-peer Botnet detection using random forests. Information Sciences, 278, 488–497.CrossRefGoogle Scholar
  10. 10.
    Spyridopoulos, T., Karanikas, G., Tryfonas, T., & Oikonomou, G. (2013). A game theoretic defense framework against dos/ddos cyber attacks. Computers & Security, 38, 39–50.CrossRefGoogle Scholar
  11. 11.
    Srivastava, V., Neel, J. O., MacKenzie, A. B., Menon, R., DaSilva, L. A., Hicks, J. E., Reed, J. H., & Gilles, R. P. (2005). Using game theory to analyze wireless ad hoc networks. IEEE Communications Surveys and Tutorials, 7(1–4), 46–56.CrossRefGoogle Scholar
  12. 12.
    Szolnoki, A., & Perc, M. (2012). Conditional strategies and the evolution of cooperation in spatial public goods games. Physical Review E, 85(2), 1–7.CrossRefGoogle Scholar
  13. 13.
    Tian, C., Yang, B., Zhong, J., & Liu, X. (2014). Trust-based incentive mechanism to motivate cooperation in hybrid p2p networks. Computer Networks, 73, 244–255.CrossRefGoogle Scholar
  14. 14.
    Yan, Z., Kantola, R., & Shen, Y. (2011). Unwanted traffic control via global trust management. In 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 647–654). Piscataway: IEEE.Google Scholar
  15. 15.
    Yan, Z., Kantola, R., & Shen, Y. (2012). Unwanted traffic control via hybrid trust management. In 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 666–673). Piscataway: IEEE.Google Scholar
  16. 16.
    Yan, Z., Kantola, R., & Shen, Y. (2014). A generic solution for unwanted traffic control through trust management. New Review of Hypermedia and Multimedia, 20(1), 25–51.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Jia Liu
    • 1
  • Mingchu Li
    • 1
  • Zitong Feng
    • 2
  • Cheng Guo
    • 1
  • Lifeng Yuan
    • 3
    Email author
  • Muhammad Alam
    • 4
  1. 1.School of Software EngineeringDalian University of TechnologyDalianChina
  2. 2.College of Electronics and Information Engineering TechnologySichuan UniversityChengduChina
  3. 3.School of CyberspaceHangzhou Dianzi UniversityHangzhouChina
  4. 4.Department of Computer Science and Software EngineeringXi’an Jiaotong-Liverpool UniversitySuzhouChina

Personalised recommendations