A game theoretic approach to cooperative intrusion detection

Abstract In Mobile Ad-Hoc Networks, cooperative intrusion detection is efficient and scalable to massively parallel attacks. However, due to concerns about privacy leakage and resource costs, if without enough incentives, most users are often selfish and disinterested in helping others to detect an intrusion event, thus an efficient incentive mechanism is required. In this paper, we formulate the incentive mechanism for cooperative intrusion detection as an evolutionary game and achieve an optimal solution to help nodes decide whether to participate in detection or not. Our proposed mechanism can deal with the problems that cooperative nodes do not own complete knowledge about other nodes. We develop a game algorithm to maximize nodes’ utility. To prevent malicious nodes from abusing our incentive mechanism, a punishment-appeal mechanism is proposed to penalize malicious behavior. Simulations demonstrate that our strategy can efficiently incentivize non-malicious nodes to cooperate and decrease the false detection rate.

[1]  Fan Wu,et al.  Data Quality Guided Incentive Mechanism Design for Crowdsensing , 2018, IEEE Transactions on Mobile Computing.

[2]  Jonathan Loo,et al.  Mobile Ad Hoc Networks: Current Status and Future Trends , 2011 .

[3]  Elisa Bertino,et al.  Privacy-Preserving Detection of Sensitive Data Exposure , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Wee Keong Ng,et al.  Privacy-preserving approach for sharing and processing intrusion alert data , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[5]  Andreas Haeberlen,et al.  Differential privacy for collaborative security , 2010, EUROSEC '10.

[6]  Sajal K. Das,et al.  Incentive Mechanisms for Participatory Sensing , 2015, ACM Trans. Sens. Networks.

[7]  EMMANOUIL VASILOMANOLAKIS,et al.  Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..

[8]  Xi Fang,et al.  Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.

[9]  Radu Stoleru,et al.  Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[10]  Athanasios V. Vasilakos,et al.  A game-theoretic approach to advertisement dissemination in ephemeral networks , 2018, World Wide Web.

[11]  Babak Sadeghiyan,et al.  Privacy issues in intrusion detection systems: A taxonomy, survey and future directions , 2017, Comput. Sci. Rev..

[12]  Yunhao Liu,et al.  PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing , 2017, IEEE Transactions on Mobile Computing.

[13]  Sushanta Karmakar,et al.  Enhancing effectiveness of intrusion detection systems: A hybrid approach , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[14]  Anita Pal,et al.  Quality adaptive online double auction in participatory sensing , 2016, ArXiv.

[15]  Richeng Jin,et al.  On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach , 2017, HotSoS.

[16]  Babak Sadeghiyan,et al.  ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols , 2014, Comput. J..

[17]  Shengli Xie,et al.  MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks , 2016, IEEE Transactions on Dependable and Secure Computing.

[18]  Shaojie Tang,et al.  A Budget Feasible Incentive Mechanism for Weighted Coverage Maximization in Mobile Crowdsensing , 2017, IEEE Transactions on Mobile Computing.

[19]  Antonio F. Gómez-Skarmeta,et al.  Trustworthy placements: Improving quality and resilience in collaborative attack detection , 2014, Comput. Networks.

[20]  Fang Binxing,et al.  Utility-based cooperative decision in cooperative authentication , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[21]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[22]  Michael P. Howarth,et al.  An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.

[23]  Han Zhang,et al.  Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach , 2018, ICCS.

[24]  Fenghua Li,et al.  Real-Time Data Incentives for IoT Searches , 2018, 2018 IEEE International Conference on Communications (ICC).