Game theoretical security detection strategy for networked systems

Information Sciences - Tập 453 - Trang 346-363 - 2018
Hao Wu1, Wei Wang2,3, Changyun Wen4, Zhengguo Li5
1The Laboratory, CNCERT/CC, Beijing, 100094, China
2School of Automation Science and Electrical Engineering, Beihang University, Beijing, 100191, China
3Beijing Advanced Innovation Center for Big Data and Brain Computing, Beihang University, Beijing 100191, China
4School of Electrical and Electronic Engineering, Nanyang Technological University, Nanyang Avenue, 639798, Singapore
5Robotics Department, Institute for Infocomm Research, 138632, Singapore

Tài liệu tham khảo

Ashfaq, 2014, Information theoretic feature space slicing for statistical anomaly detection, J. Netw. Comput. Appl., 41, 473, 10.1016/j.jnca.2014.01.002 Amin, 2013, Security of interdependent and identical networked control systems, Automatica, 49, 186, 10.1016/j.automatica.2012.09.007 Alpcan, 2011 Bradai, 2013, Game theoretic framework for reputation-based distributed intrusion detection Balasubramanian, 2013, Fault tolerance in distributed systems using fused data structures, IEEE Trans. Parallel Distrib. Syst., 24, 701, 10.1109/TPDS.2012.96 Basar, 1987, Relaxation techniques and asynchronous algorithms for on-line computation of non-cooperative equilibria, J. Econ. Dyn. Control, 11, 531, 10.1016/S0165-1889(87)80006-4 Basar, 1999 Chen, 2009, A game theoretical framework on intrusion detection in heterogeneous networks, IEEE Trans. Inf. Forensics Secur., 4, 165, 10.1109/TIFS.2009.2019154 Fudenberg, 1991 Firouzbakht, 2016, Linearly constrained bimatrix games in wireless communications, IEEE Trans. Commun., 64, 429, 10.1109/TCOMM.2015.2504085 Garnaev, 2016, Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary’s attack type is unknown, IEEE Trans. Signal Inf. Process. Netw., 2, 49, 10.1109/TSIPN.2015.2506038 von Heusinger, 2010, Newtons method for computing a normalized equilibrium in the generalized Nash game through fixed point formulation, Math. Progr., 132, 99 Ismail, 2014, A game theoretical analysis of data confidentiality attacks on smart-grid AMI, IEEE J. Sel. Areas Commun., 32, 1486, 10.1109/JSAC.2014.2332095 Keliris, 2013, A distributed fault detection filtering approach for a class of interconnected continuous-time nonlinear systems, IEEE Trans. Autom. Control, 58, 2032, 10.1109/TAC.2013.2253231 Li, 2010, Attack and flee: game-theory-based analysis on interactions among nodes in MANETs, IEEE Trans. Syst. Man Cybern. Part B Cybern., 40, 612, 10.1109/TSMCB.2009.2035929 Liao, 2013, Intrusion detection system: a comprehensive review, J. Netw. Comput. Appl., 36, 16, 10.1016/j.jnca.2012.09.004 Lian, 2015, Passivity of switched recurrent neural networks with time-varying delays, IEEE J. Neural Netw. Learn. Syst., 26, 357, 10.1109/TNNLS.2014.2379920 Li, 1987, Distributed algorithms for the computation of non-cooperative equilibria, Automatica, 23, 523, 10.1016/0005-1098(87)90081-1 Liang, 2013, Game theory for network security, IEEE Commun. Surv. Tutor., 15, 472, 10.1109/SURV.2012.062612.00056 Liu, 2006, A Bayesian game approach for intrusion detection in wireless ad hoc networks, ACM Int. Conf. Proc. Ser., 199 Manikopoulos, 2002, Network intrusion and fault detection: a statistical anomaly approach, IEEE Commun. Mag., 40, 76, 10.1109/MCOM.2002.1039860 Ma, 2013, Markov game analysis for attack-defense of power networks under possible misinformation, IEEE Trans. Power Syst., 28, 1676, 10.1109/TPWRS.2012.2226480 Moosavi, 2014, A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks, IEEE Trans. Inf. Forensics Secur., 9, 1367, 10.1109/TIFS.2014.2332816 Manshaei, 2013, Game theory meets network security and privacy, ACM Comput. Surv., 45, 10.1145/2480741.2480742 Nguyen, 2009, Security games with incomplete information Nguyen, 2009, Stochastic games for security in networks with interdependent nodes Nguyen, 2010, Security games with decision and observation errors Rosen, 1965, Existence and uniqueness of equilibrium points for concave n-person games, Econometrica, 33, 520, 10.2307/1911749 Roy, 2010, A survey of game theory as applied to network security Shames, 2011, Distributed fault detection for interconnected second-order systems, Automatica, 47, 2757, 10.1016/j.automatica.2011.09.011 Sagduyu, 2009, MAC games for distributed wireless network security with incomplete information of selfish and malicious user types Sagduyu, 2011, Jamming games in wireless networks with incomplete information, IEEE Commun. Mag., 49, 112, 10.1109/MCOM.2011.5978424 Teodoro, 2009, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput. Secur., 28, 18, 10.1016/j.cose.2008.08.003 Wang, 2013, Output feedback control of networked control systems with packet dropouts in both channels, Inf. Sci. (Ny), 221, 544, 10.1016/j.ins.2012.09.045 Wang, 2016, Distributed filtering for switched nonlinear positive systems with missing measurements over sensor networks, IEEE Sens. J., 16, 4940, 10.1109/JSEN.2016.2555761 Wei, 2012, CSI Usage over parallel fading channels under jamming attacks: a game theory study, IEEE Trans. Commun., 60, 1167, 10.1109/TCOMM.2012.021712.100018 Wang, 2010, Attacker detection game in wireless networks with channel uncertainty Wang, 2014, A game theoretic approach to detect and co-exist with malicious nodes in wireless networks, Comput. Netw., 71, 63, 10.1016/j.comnet.2014.06.008 Xiao, 2012, Indirect reciprocity security game for large-scale wireless networks, IEEE Trans. Inf. Forensics Secur., 7, 1368, 10.1109/TIFS.2012.2202228 Yang, 2013, Coping with a smart jammer in wireless networks: a Stackelberg game approach, IEEE Trans. Wireless Commun., 12, 4038, 10.1109/TWC.2013.071913121570 Yang, 2015, Fault recoverability and fault tolerant control for a class of interconnected nonlinear systems, Automatica, 54, 49, 10.1016/j.automatica.2015.01.037 Yu, 2011, Traceback of DDos attacks using entropy variations, IEEE Trans. Parallel Distrib. Syst., 22, 412, 10.1109/TPDS.2010.97 Yu, 2008, Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: a game-theoretic approach, IEEE Trans. Inf. Forensics Secur., 3, 317, 10.1109/TIFS.2008.922453 Zhu, 2012, GUIDEX: a game-theoretic incentive-based mechanism for intrusion detection networks, IEEE J. Sel. Areas Commun., 30, 2220, 10.1109/JSAC.2012.121214 Zhu, 2010, Network security configurations: a nonzero-sum stochastic game approach Zonouz, 2014, RRE: a game-theoretic intrusion response and recovery engine, IEEE Trans. Parallel Distrib. Syst., 25, 395, 10.1109/TPDS.2013.211