메뉴 건너뛰기




Volumn 17, Issue 5, 2015, Pages 1017-1028

Game-theoretic strategies for IDS deployment in peer-to-peer networks

Author keywords

Game theory; Intrusion detection; Peer to peer

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; GAME THEORY; INTRUSION DETECTION; MERCURY (METAL); NETWORK ARCHITECTURE;

EID: 84942105224     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-015-9582-1     Document Type: Article
Times cited : (8)

References (28)
  • 2
    • 79959681025 scopus 로고    scopus 로고
    • Low-resource routing attacks against tor. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, ACM, New York, NY, USA
    • Bauer, K., McCoy, D., Grunwald, D., Kohno, T., & Sicker, D. (2007). Low-resource routing attacks against tor. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, ACM, New York, NY, USA, WPES ’07, pp 11–20.
    • (2007) WPES ’07 , pp. 11-20
    • Bauer, K.1    McCoy, D.2    Grunwald, D.3    Kohno, T.4    Sicker, D.5
  • 4
    • 0038687704 scopus 로고    scopus 로고
    • Query-flood dos attacks in gnutella. In Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA
    • Daswani, N., & Garcia-Molina, H. (2002). Query-flood dos attacks in gnutella. In Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, CCS ’02, pp 181–192.
    • (2002) CCS ’02 , pp. 181-192
    • Daswani, N.1    Garcia-Molina, H.2
  • 5
    • 84890372682 scopus 로고    scopus 로고
    • DEXA’06. 17th International Workshop on
    • Duma, C., Karresand, M., Shahmehri, N., & Caronni, G. (2006). A trust-aware, p2p-based overlay for intrusion detection. In Database and Expert Systems Applications, 2006. DEXA’06. 17th International Workshop on, IEEE, pp 692–697.
    • (2006) IEEE , pp. 692-697
  • 6
    • 84942178874 scopus 로고    scopus 로고
    • Sufficiently secure peer-to-peer networks
    • Gatti, R., Lewis, S., Ozment, A., Rayna, T., & Serjantov, A
    • Gatti, R., Lewis, S., Ozment, A., Rayna, T., & Serjantov, A. (2004). Sufficiently secure peer-to-peer networks. In Proceedings of the Third Workshop on Economics and Information Security.
    • (2004) In Proceedings of the Third Workshop on Economics and Information Security
  • 7
    • 84942178875 scopus 로고    scopus 로고
    • Gillet, M.. Skype’s cloud-based architecture., , accessed on 5th January 2015
    • Gillet, M. (2013). Skype’s cloud-based architecture., http://blogs.skype.com/2013/10/04/skype-architecture-update/, accessed on 5th January 2015.
    • (2013)
  • 8
    • 84942121141 scopus 로고    scopus 로고
    • Indra: A peer-to-peer approach to network intrusion detection and prevention. In Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on
    • Janakiraman, R., Waldvogel, M., & Zhang, Q. (2003). Indra: A peer-to-peer approach to network intrusion detection and prevention. In Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on, IEEE, 226–231.
    • (2003) IEEE , pp. 226-231
    • Janakiraman, R.1    Waldvogel, M.2    Zhang, Q.3
  • 9
    • 84880467894 scopus 로고    scopus 로고
    • The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web
    • Kamvar, S.D., Schlosser, M.T., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web, ACM, pp 640–651.
    • (2003) ACM , pp. 640-651
    • Kamvar, S.D.1    Schlosser, M.T.2    Garcia-Molina, H.3
  • 11
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusions via sampling: a game theoretic approach. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
    • Kodialam, M., & Lakshman, T. (2003). Detecting network intrusions via sampling: a game theoretic approach. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, IEEE, 3, 1880–1889.
    • (2003) IEEE , vol.3 , pp. 1880-1889
    • Kodialam, M.1    Lakshman, T.2
  • 12
    • 80053417640 scopus 로고    scopus 로고
    • Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness
    • Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., & Tambe, M. (2011). Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. J Artif Intell Res(JAIR), 41, 297–327.
    • (2011) J Artif Intell Res(JAIR) , vol.41 , pp. 297-327
    • Korzhyk, D.1    Yin, Z.2    Kiekintveld, C.3    Conitzer, V.4    Tambe, M.5
  • 17
    • 33748677680 scopus 로고    scopus 로고
    • When selfish meets evil: Byzantine players in a virus inoculation game. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
    • Moscibroda, T., Schmid, S., & Wattenhofer, R. (2006). When selfish meets evil: Byzantine players in a virus inoculation game. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, ACM, 35–44.
    • (2006) ACM , pp. 35-44
    • Moscibroda, T.1    Schmid, S.2    Wattenhofer, R.3
  • 19
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA
    • Murdoch, S.J., & Danezis, G. (2005). Low-cost traffic analysis of tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, SP ’05, 183–195.
    • (2005) SP ’05 , pp. 183-195
    • Murdoch, S.J.1    Danezis, G.2
  • 20
    • 84942178878 scopus 로고    scopus 로고
    • Game-theoretic patrolling strategies for intrusion detection in collaborative peer-to-peer networks
    • Narang, P., Mehta, K., & Hota, C
    • Narang, P., Mehta, K., & Hota, C. (2014). Game-theoretic patrolling strategies for intrusion detection in collaborative peer-to-peer networks. In International Conference on Secure Knowledge Management in Big-data era.
    • (2014) In International Conference on Secure Knowledge Management in Big-data era
  • 22
    • 84947265806 scopus 로고    scopus 로고
    • Security considerations for peer-to-peer distributed hash tables. In Peer-to-Peer Systems
    • Sit, E., & Morris, R. (2002). Security considerations for peer-to-peer distributed hash tables. In Peer-to-Peer Systems, Springer, pp 261–269.
    • (2002) Springer , pp. 261-269
    • Sit, E.1    Morris, R.2
  • 24
    • 50649125455 scopus 로고    scopus 로고
    • Game theoretic modeling of malicious users in collaborative networks. Selected Areas in Communications
    • Theodorakopoulos, G., & Baras, J. (2008). Game theoretic modeling of malicious users in collaborative networks. Selected Areas in Communications. IEEE Journal on, 26(7), 1317–1327.
    • (2008) IEEE Journal on , vol.26 , Issue.7 , pp. 1317-1327
    • Theodorakopoulos, G.1    Baras, J.2
  • 25
    • 34548359382 scopus 로고    scopus 로고
    • Malicious users in unstructured networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE
    • Theodorakopoulos, G., & Baras, J.S. (2007). Malicious users in unstructured networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, IEEE, pp 884–891.
    • (2007) IEEE , pp. 884-891
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 26
    • 84899445988 scopus 로고    scopus 로고
    • Game-theoretic resource allocation for malicious packet detection in computer networks. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2
    • Vaněk, O., Yin, Z., Jain, M., Bošanskỳ, B., Tambe, M., & Pěchouček, M. (2012). Game-theoretic resource allocation for malicious packet detection in computer networks. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, International Foundation for Autonomous Agents and Multiagent Systems, 905–912.
    • (2012) International Foundation for Autonomous Agents and Multiagent Systems , pp. 905-912
    • Vaněk, O.1    Yin, Z.2    Jain, M.3    Bošanskỳ, B.4    Tambe, M.5    Pěchouček, M.6
  • 27
    • 13244299177 scopus 로고    scopus 로고
    • Proceedings. Proceedings. Fourth International Conference on
    • Ye, S., Makedon, F., & Ford, J. (2004). Collaborative automated trust negotiation in peer-to-peer systems. In Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on, IEEE, 108–115.
    • (2004) IEEE , pp. 108-115
  • 28
    • 79955724878 scopus 로고    scopus 로고
    • Traffic analysis attacks on skype voip calls
    • Zhu, Y., & Fu, H. (2011). Traffic analysis attacks on skype voip calls. Computer Communications, 34(10), 1202–1212.
    • (2011) Computer Communications , vol.34 , Issue.10 , pp. 1202-1212
    • Zhu, Y.1    Fu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.