Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1190195.1190198acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

A Bayesian game approach for intrusion detection in wireless ad hoc networks

Published: 14 October 2006 Publication History

Abstract

In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) can be deployed at each mobile node, significant constraints are imposed in terms of the energy expenditure of such systems. In this paper, we propose a game theoretic framework to analyze the interactions between pairs of attacking/defending nodes using a Bayesian formulation. We study the achievable Nash equilibrium for the attacker/defender game in both static and dynamic scenarios. The dynamic Bayesian game is a more realistic model, since it allows the defender to consistently update his belief on his opponent's maliciousness as the game evolves. A new Bayesian hybrid detection approach is suggested for the defender, in which a lightweight monitoring system is used to estimate his opponent's actions, and a heavyweight monitoring system acts as a last resort of defense. We show that the dynamic game produces energy-efficient monitoring strategies for the defender, while improving the overall hybrid detection power.

References

[1]
Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 135--147, October 2003.
[2]
H. Deng, Q. Zeng, and D. P. Agrawal. SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of the IEEE Vehicular Technology Conference (VTC'03), volume 3, pages 2147--2151, October 2003.
[3]
O. Kachirski and R. Guha. Intrusion detection using mobile agents in wireless ad hoc networks. In Proceedings of the IEEE Workshop on Knowledge Media Networking, pages 153--158, July 2002.
[4]
C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt. A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 125--134, October 2003.
[5]
D. Fudenberg and J. Tirole. Game Theory. The MIT Press, Cambridge, Massachusetts, 1991.
[6]
J. R. Douceur. The Sybil attack. In First International Workshop on Peer-to-Peer Systems (IPTPS '02), March 2002.
[7]
Y-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. In Proc. IEEE INFOCOM 2003, volume 3, pages 1976--1986, March-April 2003.
[8]
Y. Liu, Y. Li, and H. Man. Short paper: A distributed cross-layer intrusion detection system for ad hoc networks. In Proc. IEEE/CreateNet the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pages 418--420, September 2005.
[9]
Y. Huang, W. Fan, W. Lee, and P. S. Yu. Cross-feature analysis for detecting ad-hoc routing anomalies. In Proc. 23th Int'l Conference on Distributed Computing Systems (ICDCS), pages 478--487, May 2003.
[10]
Y. Liu, Y. Li, and H. Man. MAC layer anomaly detection in ad hoc networks. In Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, pages 402--409, June 2005.
[11]
J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), pages 85--97, October 1998.
[12]
P. Liu and W. Zang. Incentive-based modeling and inference of attacker intent, objectives, and strategies. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 179--189, October 2003.
[13]
M. Kodialam and T. V. Lakshman. Detecting network intrusions via sampling: A game theoretic approach. In Proc. IEEE INFOCOM 2003, volume 3, pages 1880--1889, March-April 2003.
[14]
T. Alpcan and T. Basar. A game theoretic analysis of intrusion detection in access control systems. In Proceeding of the 43rd IEEE Conference on Decision and Control (CDC), December 2004.
[15]
A. Agah, S. K. Das, K. Basu, and M. Asadi. Intrusion detection in sensor networks: A non-cooperative game approach. In Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA '04), pages 343--346, August-September 2004.
[16]
T. Alpcan and T. Basar. A game theoretic approach to decision and analysis in network intrusion detection. In Proceeding of the 42nd IEEE Conference on Decision and Control (CDC), December 2003.
[17]
V. Srinivasan, P. Nuggehalli, C-F. Chiasserini, and R. R. Rao. An analytical approach to the study of cooperation in wireless ad hoc networks. IEEE Transsactions on Communications, 4(2):722--733, March 2005.
[18]
Y. Xiao, X. Shan, and Y. Ren. Game theory models for IEEE 802.11 DCF in wireless ad hoc networks. IEEE Radio Communications, 43(3):S22--S26, March 2005.
[19]
J. Cai and U. Pooch. Allocate fair payoff for cooperation in wireless ad hoc networks using Shapley value. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS'04), page 219, April 2004.
[20]
P. Nurmi. Modelling routing in wireless ad hoc networks with dynamic Bayesian games. In Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. 2004 First Annual IEEE Communications Society Conference, pages 63--70, October 2004.
[21]
A. Urpi, M. Bonuccelli, and S. Giordano. Modelling cooperation in mobile ad hoc networks: A formal description of selfishness. In WiOpt'03 Workshop: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.

Cited By

View all
  • (2024)Cloud security in the age of adaptive adversariesJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2024.103281156:COnline publication date: 1-Nov-2024
  • (2023)Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling GameICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10279109(6016-6021)Online publication date: 28-May-2023
  • (2023)Implications of false alarms in dynamic games on cyber-securityChaos, Solitons & Fractals10.1016/j.chaos.2023.113322169(113322)Online publication date: Apr-2023
  • Show More Cited By

Index Terms

  1. A Bayesian game approach for intrusion detection in wireless ad hoc networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GameNets '06: Proceeding from the 2006 workshop on Game theory for communications and networks
    October 2006
    112 pages
    ISBN:159593507X
    DOI:10.1145/1190195
    • Conference Chairs:
    • Luiz A. DaSilva,
    • Allen B. MacKenzie,
    • Jacqueline Morgan
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 October 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Bayesian game
    2. ad hoc network
    3. attacker/defender game
    4. noncooperative game

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)69
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Cloud security in the age of adaptive adversariesJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2024.103281156:COnline publication date: 1-Nov-2024
    • (2023)Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling GameICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10279109(6016-6021)Online publication date: 28-May-2023
    • (2023)Implications of false alarms in dynamic games on cyber-securityChaos, Solitons & Fractals10.1016/j.chaos.2023.113322169(113322)Online publication date: Apr-2023
    • (2023)A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and ApplicationsWireless Personal Communications10.1007/s11277-023-10773-x133:1(395-452)Online publication date: 23-Dec-2023
    • (2023)Impact of computer users on cyber defense strategiesSystems Engineering10.1002/sys.2173727:3(532-555)Online publication date: 28-Nov-2023
    • (2021)Intrusion Detection System Configuration Under Asymmetric Information2021 American Control Conference (ACC)10.23919/ACC50511.2021.9482975(4637-4642)Online publication date: 25-May-2021
    • (2021)Game Theory Role in Wireless Network Security – Status, Challenges and Future trends2021 International Conference on Advance of Sustainable Engineering and its Application (ICASEA)10.1109/ICASEA53739.2021.9733015(230-235)Online publication date: 27-Oct-2021
    • (2021)Attack path prediction based on Bayesian game modelJournal of Physics: Conference Series10.1088/1742-6596/1955/1/0120981955:1(012098)Online publication date: 1-Jun-2021
    • (2020)Game Theoretic Honeypot Deployment in Smart GridSensors10.3390/s2015419920:15(4199)Online publication date: 28-Jul-2020
    • (2020)Power system resilience through defender-attacker-defender models with uncertainty: an overview2020 Resilience Week (RWS)10.1109/RWS50334.2020.9241279(11-17)Online publication date: 19-Oct-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media