Back to Search
Start Over
Game-theoretic strategies for IDS deployment in peer-to-peer networks.
- Source :
- Information Systems Frontiers; Oct2015, Vol. 17 Issue 5, p1017-1028, 12p, 1 Diagram, 5 Charts
- Publication Year :
- 2015
-
Abstract
- This work studies the problem of optimal positioning of Intrusion Detection Systems (IDSs) in a Peer-to-Peer (P2P) environment involving a number of peers and super-peers. This scenario applies to network architectures like that of Gnutella, Skype or Tor, which involve a huge number of leaf-peers and a selected number of super-peers who have higher responsibilities in the network. A malicious entity may become part of the P2P network by joining from any part of the network. It can attack a super-peer and thus disrupt the functioning of the P2P network. Peers may try to secure the network by running IDSs at certain strategically-chosen locations in the network. But a deterministic schedule of running and positioning the IDSs can be observed and thwarted by an adversary. In this paper, we explore the problem of strategically positioning IDSs in a P2P network with a randomized, game-theoretic approach. Our approach distributes the responsibility of running the IDSs between the peers in a randomized fashion and minimizes the probability of a successful attack. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 13873326
- Volume :
- 17
- Issue :
- 5
- Database :
- Complementary Index
- Journal :
- Information Systems Frontiers
- Publication Type :
- Academic Journal
- Accession number :
- 109474407
- Full Text :
- https://doi.org/10.1007/s10796-015-9582-1