메뉴 건너뛰기




Volumn , Issue , 2016, Pages 261-266

Configuration strategies for collaborative IDS using game theory

Author keywords

Collaborative IDS; Network Security; Stationary Nash equilibrium; Stochastic Games

Indexed keywords

CHEMICAL DETECTION; COMPUTATION THEORY; INTRUSION DETECTION; LIBRARIES; NETWORK SECURITY; STOCHASTIC SYSTEMS;

EID: 84994157603     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IranianCEE.2016.7585529     Document Type: Conference Paper
Times cited : (9)

References (27)
  • 1
    • 0040749982 scopus 로고    scopus 로고
    • Cooperating security managers: Distributed intrusion detection systems
    • G. White and V. Pooch, "Cooperating security managers: Distributed intrusion detection systems," Computers &Security, vol. 15, pp. 441-450, 1996
    • (1996) Computers &Security , vol.15 , pp. 441-450
    • White, G.1    Pooch, V.2
  • 2
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Computers &Security, vol. 29, pp. 124-140, 2010
    • (2010) Computers &Security , vol.29 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 11
    • 77957824022 scopus 로고    scopus 로고
    • Network security configurations: A nonzero-sum stochastic game approach
    • Q. Zhu, H. Tembine, and T. Basar, "Network security configurations: A nonzero-sum stochastic game approach," in American Control Conference (ACC), 2010, 2010, pp. 1059-1064
    • (2010) American Control Conference (ACC), 2010 , pp. 1059-1064
    • Zhu, Q.1    Tembine, H.2    Basar, T.3
  • 13
    • 76949106169 scopus 로고    scopus 로고
    • A puzzle-based defense strategy against flooding attacks using game theory
    • M. S. Fallah, "A puzzle-based defense strategy against flooding attacks using game theory," Dependable and Secure Computing, IEEE Transactions on, vol. 7, pp. 5-19, 2010
    • (2010) Dependable and Secure Computing, IEEE Transactions on , vol.7 , pp. 5-19
    • Fallah, M.S.1
  • 19
    • 0037105912 scopus 로고    scopus 로고
    • Intrusion detection with mobile agents
    • W. A. Jansen, "Intrusion detection with mobile agents," Computer Communications, vol. 25, pp. 1392-1401, 2002
    • (2002) Computer Communications , vol.25 , pp. 1392-1401
    • Jansen, W.A.1
  • 21
    • 84908539831 scopus 로고    scopus 로고
    • An improved distributed intrusion detection architecture for cloud computing
    • ed: Springer
    • H. R. Ghorbani and M. R. Hashemi, "An Improved Distributed Intrusion Detection Architecture for Cloud Computing," in Computer Networks and Distributed Systems, ed: Springer, 2014, pp. 105-116
    • (2014) Computer Networks and Distributed Systems , pp. 105-116
    • Ghorbani, H.R.1    Hashemi, M.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.