메뉴 건너뛰기




Volumn 2, Issue 2, 2006, Pages 131-137

A game theoretic formulation for intrusion detection in mobile Ad hoc networks

Author keywords

Game theory; Intrusion detection; Mobile Ad hoc networks

Indexed keywords

AD HOC ENVIRONMENT; CONSTRUCT MODELS; GAME-THEORETIC; GAME-THEORETIC MODEL; MALICIOUS ACTIVITIES; NONCOOPERATIVE GAME; SECURITY ARCHITECTURE; VARIOUS ATTACKS;

EID: 84874825833     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (73)

References (20)
  • 1
    • 18144409187 scopus 로고    scopus 로고
    • Selfish behavior and stability of the internet: a game-theoretic analysis of TCP
    • tech-nologies, architectures, and protocols for computer communications (SIGCOMM 2002:)
    • A. Akella, S. Seshan, R. Karp, S. Shenker, and C. Papadimitriou, "Selfish behavior and stability of the internet: a game-theoretic analysis of TCP," in Pro-ceedings of the 2002 conference on Applications, tech-nologies, architectures, and protocols for computer communications (SIGCOMM 2002:), pp. 117-130, 2002.
    • (2002) Pro-ceedings of the 2002 conference on Applications , pp. 117-130
    • Akella, A.1    Seshan, S.2    Karp, R.3    Shenker, S.4    Papadimitriou, C.5
  • 2
    • 85048046913 scopus 로고    scopus 로고
    • A game theoretic ap-proach to decision and analysis in network intrusion detection
    • Piscataway, NJ, USA, Dec
    • T. Alpacan and T. Basar, "A game theoretic ap-proach to decision and analysis in network intrusion detection," in Proceedings of 42rd IEEE Conference on Decision and Control, pp. 1880-1889, Piscataway, NJ, USA, Dec. 2003.
    • (2003) Proceedings of 42rd IEEE Conference on Decision and Control , pp. 1880-1889
    • Alpacan, T.1    Basar, T.2
  • 3
    • 8744291719 scopus 로고    scopus 로고
    • A power control game based on outage probabilities for multicell wire-less data networks
    • Piscat-away, NJ, USA, July
    • T. Alpcan, T. Basar, and S. Dey, "A power control game based on outage probabilities for multicell wire-less data networks," in Proceedings of the American Control Conference, vol. 2, pp. 1661-1666, Piscat-away, NJ, USA, July 2004.
    • (2004) Proceedings of the American Control Conference , vol.2 , pp. 1661-1666
    • Alpcan, T.1    Basar, T.2    Dey, S.3
  • 4
    • 0004048154 scopus 로고
    • Technical Report, Contract 79F26400, James P. Anderson Co., Fort Washington, Fort Washington, PA
    • J. P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical Report, Contract 79F26400, James P. Anderson Co., Fort Washington, Fort Washington, PA, 1980.
    • (1980) Computer Security Threat Monitoring and Surveillance
    • Anderson, J.P.1
  • 5
    • 15944370066 scopus 로고    scopus 로고
    • A game based analysis of the client puzzle approach to de-fend against dos attacks
    • Telecommunications and Computer Networks
    • B. Bencsath, I. Vajda, and L. Buttyan, "A game based analysis of the client puzzle approach to de-fend against dos attacks," in Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks, pp. 763-767, 2003.
    • (2003) Proceedings of the IEEE Conference on Software , pp. 763-767
    • Bencsath, B.1    Vajda, I.2    Buttyan, L.3
  • 6
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Piscataway, NJ, USA
    • D. E. Denning, "An intrusion detection model," in IEEE Transactions on Software Engineering, vol. 13, pp. 222-232, Piscataway, NJ, USA, 1986.
    • (1986) IEEE Transactions on Software Engineering , vol.13 , pp. 222-232
    • Denning, D.E.1
  • 7
    • 84874892948 scopus 로고    scopus 로고
    • Game Theory. Cambridge, MA: The MIT Press
    • D. Fudenberg and J. Tirole, Game Theory. Cambridge, MA: The MIT Press, 2002.
    • (2002)
    • Fudenberg, D.1    Tirole, J.2
  • 10
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusions via sampling: A game theoretic ap-proach
    • Piscataway, NJ, USA, Apr
    • M. Kodialam and T. V. Lakshman, "Detecting net-work intrusions via sampling: A game theoretic ap-proach," in IEEE INFOCOMM 2003, pp. 1880-1889, Piscataway, NJ, USA, Apr. 2003.
    • (2003) IEEE INFOCOMM 2003 , pp. 1880-1889
    • Kodialam, M.1    Lakshman, T.V.2
  • 11
    • 35248851967 scopus 로고    scopus 로고
    • Flexible, mobile agent based intrusion detection for dynamic networks
    • Distributed Systems Group at the Technical University of Vi-enna, 3rd Floor, Central Entrance, 1040 Vienna, Austria, Apr. 30
    • C. Kruegel and T. Toth, "Flexible, mobile agent based intrusion detection for dynamic networks," Technical Report TUV-1841-2002-27, Distributed Systems Group at the Technical University of Vi-enna, 3rd Floor, Central Entrance, 1040 Vienna, Austria, Apr. 30 2002.
    • (2002) Technical Report TUV-1841-2002-27
    • Kruegel, C.1    Toth, T.2
  • 14
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless Ad hoc networks
    • Piscataway, NJ, USA, Feb
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless Ad hoc networks," in IEEE Wireless Communications, vol. 11, pp. 48-60, Pis-cataway, NJ, USA, Feb. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 15
    • 84874877890 scopus 로고
    • A Course in Game Theory. Cambridge, MA: The MIT Press
    • M. J. Osborne and A. Rubinstein, A Course in Game Theory. Cambridge, MA: The MIT Press, 1994.
    • (1994)
    • Osborne, M.J.1    Rubinstein, A.2
  • 17
    • 0029533860 scopus 로고
    • Making greed work in networks: a game-theoretic analysis of switch service disci-plines
    • S. J. Shenker, "Making greed work in networks: a game-theoretic analysis of switch service disci-plines," IEEE/ACM Transactions of Networking, vol. 3, no. 6, pp. 819-831, 1995.
    • (1995) IEEE/ACM Transactions of Networking , vol.3 , Issue.6 , pp. 819-831
    • Shenker, S.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.