Abstract
Nowadays, individuals, as well as corporations, use the internet on a daily basis to send and receive emails, browse the internet, perform financial transactions, etc…However, this dependence comes with the huge risk of communicating over a network that has been compromised. Network administrators are constantly faced with new and improved security attacks that might result in significant losses. Only recently have game theoretic approaches found their way into the area of network security. In this paper we discuss the different types of security attacks while focusing on a general attack that resembles attacks on mobile ad hoc networks or MANETs. We model the attack as a Bayesian repetitive game with incomplete information between a malicious node and a normal node. We study the Nash equilibria of the game, and describe several punishment strategies. Finally, we show the results of our simulations where an equilibrium state is always reached and the average profit of normal nodes always significantly exceeds that of malicious nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IBM. An information resource for data breach prevention and response. ibm.com, http://www-935.ibm.com/services/us/en/it-services/data-breach/data-breach-statistics.html (accessed: November 13, 2013)
ZDNet. Android app malware rates jump 40 percent, zdnet.com, http://www.zdnet.com/android-app-malware-rates-jump-40-percent-7000019093/ (accessed: November 13, 2013)
readwrite. Google Play Hits One Million Android Apps, readwrite.com, http://readwrite.com/2013/07/24/google-play-hits-one-million-android-apps#awesm=~onaP99fjV8C2eD (accessed: November 12, 2013)
Karaa, H., Lau, J.Y.: Game Theory Applications in Network Reliability. In: Proc. Communications, 23rd Biennial Symposium, pp. 236–239 (2006)
Ileri, O., Mauand, S.-C., Mandayam, N.B.: Pricing for enabling forwarding in self-configuring ad hoc networks. IEEE Journal on Selected Areas in Communications 23(1), 151–162 (2005)
Bandyopadhyay, S., Bandyopadhyay, S.: A game-theoretic analysis on the conditions of cooperation in a wireless ad hoc network. In: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 54–58 (2005)
Carin, L., Cybenko, G., Hughes, J.: Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology. IEEE Computer (2008)
Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: ACM International Conference Proceeding Series, vol. 199 (2006)
Lye, K., Wing, J.: Game strategies in network security. In: Proceedings of the Foundations of Computer Security (2002)
Nguyen, K.C., Alpcan, T., Basar, T.: Stochastic games for security in networks with interdependent nodes. In: Proc. of Intl. Conf. on Game Theory for Networks (GameNets) (2009)
Xiaolin, C., Xiaobin, T., Yong, Z., Hongsheng, X.: A Markov game theory-based risk assessment model for network information systems. In: International Conference on Computer Science and Software Engineering (2008)
Alpcan, T., Baser, T.: An intrusion detection game with limited observations. In: Proc. of the 12th Int. Symp. on Dynamic Games and Applications (2006)
Nguyen, K.C., Alpcan, T., Basar, T.: Security games with incomplete information. In: Proc. of IEEE Intl. Conf. on Communications (ICC) (2009)
Patcha, A., Park, J.: A game theoretic approach to modeling intrusion detection in mobile ad hoc networks. In: Proceedings of the 2004 IEEE Workshop on Information Assurance and Security (2004)
You, X., Shiyong, Z.: A kind of network security behavior model based on game theory. In: Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Saab, F., Awad, M. (2015). Modeling Attacks on MANET Using an Incomplete Repeated Bayesian Game. In: Filev, D., et al. Intelligent Systems'2014. Advances in Intelligent Systems and Computing, vol 323. Springer, Cham. https://doi.org/10.1007/978-3-319-11310-4_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-11310-4_24
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11309-8
Online ISBN: 978-3-319-11310-4
eBook Packages: EngineeringEngineering (R0)