浏览全部资源
扫码关注微信
1. 绍兴文理学院计算机科学与工程系,浙江 绍兴 312000
2. 东华大学计算机科学与技术学院,上海 201620
[ "沈士根(1974−),男,博士,绍兴文理学院计算机科学与工程系教授,主要研究方向为无线传感器网络、物联网、博弈论。" ]
[ "冯晟(1979−),男,博士,绍兴文理学院计算机科学与工程系讲师,主要研究方向为无线传感器网络、物联网、计算机视觉、智能机器人。" ]
[ "黄龙军(1976−),男,博士,绍兴文理学院计算机科学与工程系讲师,主要研究方向为无线传感器网络、博弈论。" ]
[ "胡珂立(1989−),男,博士,绍兴文理学院计算机科学与工程系讲师,主要研究方向为图像处理、目标跟踪、中智理论。" ]
[ "曹奇英(1960−),男,博士,东华大学计算机科学与技术学院教授、博士生导师,主要研究方向为普适计算、智能信息处理。" ]
网络出版日期:2018-09,
纸质出版日期:2018-09-20
移动端阅览
沈士根, 冯晟, 周海平, 等. 基于云计算和动态贝叶斯博弈的WSN恶意程序传播优化抑制方法[J]. 电信科学, 2018,34(9):78-86.
Shigen SHEN, Sheng FENG, Haiping ZHOU, et al. Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game[J]. Telecommunications science, 2018, 34(9): 78-86.
沈士根, 冯晟, 周海平, 等. 基于云计算和动态贝叶斯博弈的WSN恶意程序传播优化抑制方法[J]. 电信科学, 2018,34(9):78-86. DOI: 10.11959/j.issn.1000-0801.2018259.
Shigen SHEN, Sheng FENG, Haiping ZHOU, et al. Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game[J]. Telecommunications science, 2018, 34(9): 78-86. DOI: 10.11959/j.issn.1000-0801.2018259.
为有效地应用入侵检测系统检测WSN(wireless sensor network,无线传感网络)恶意程序从而抑制WSN恶意程序传播,在考虑WSN节点资源有限和云计算平台资源几乎无限的现状基础上,借助云计算平台提出WSN入侵检测网络结构。依据传感节点和WSN入侵检测代理之间博弈过程的分析,使用动态贝叶斯博弈建立了考虑WSN入侵检测代理监控数据发送能耗和传感节点隐私保护需求的WSN恶意程序传播抑制博弈模型。依据建立的博弈类型,并基于精炼贝叶斯均衡提出抑制WSN恶意程序传播的优化策略,并给出具体的算法。实验分析了影响WSN入侵检测代理选择优化策略的因素,为具体应用提供了实验依据。
To apply intrusion detection system (IDS) efficiently so as to suppress WSN malware propagation
a cloud-based network infrastructure for realizing functions of WSN IDS was presented
considering the real basis that the resources of WSN nodes were limited whilst the resources of cloud computing platform were almost unlimited.Based on the analysis of the game process between a sensor node and the corresponding WSN IDS agent
a WSN-malware-propagation-suppression game model was constructed by employing the dynamic Bayesian game
and the requirements of energy consumption in sending monitored data and privacy protection for sensor nodes were satisfied.According to the proposed game type and refined Bayesian equilibrium
the optimal strategie for suppressing WSN malware was proposed as well the algorithm for actual application was given.The factors that influence WSN IDS agents to select their optimal strategies were analyzed
and the experimental foundation was provided for the application of the proposed approach.
罗军舟 , 杨明 , 凌振 , 等 . 网络空间安全体系与关键技术 [J ] . 中国科学:信息科学 , 2016 , 46 ( 8 ): 939 - 968 .
LUO J Z , YANG M , LING Z , et al . Architecture and key technologies of cyberspace security [J ] . Scientia Sinica:Informationis , 2016 , 46 ( 8 ): 939 - 968 .
张焕国 , 韩文报 , 来学嘉 , 等 . 网络空间安全综述 [J ] . 中国科学:信息科学 , 2016 , 46 ( 2 ): 125 - 164 .
ZHANG H G , HAN W B , LAI X J , et al . Survey on cyberspace security [J ] . Scientia Sinica:Informationis , 2016 , 46 ( 2 ): 125 - 164 .
沈士根 , 黄龙军 , 范恩 , 等 . 受恶意程序传染的WSN可生存性评估 [J ] . 传感技术学报 , 2016 , 29 ( 7 ): 1083 - 1089 .
SHEN S G , HUANG L J , FAN E , et al . Survivability evaluation for WSN under malware infection [J ] . Chinese Journal of Sensors and Actuators , 2016 , 29 ( 7 ): 1083 - 1089 .
沈士根 , 刘建华 , 曹奇英 . 博弈论与无线传感器网络安全 [M ] . 北京 : 清华大学出版社 , 2016 .
SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor networks security [M ] . Beijing : Tsinghua University PressPress , 2016 .
沈士根 , 黄龙军 , 周海平 , 等 . 面向恶意程序传播的异质WSN 稳态可用度评估 [J ] . 传感技术学报 , 2017 , 30 ( 7 ): 1100 - 1105 .
SHEN S G , HUANG L J , ZHOU H P , et al . Steady-state availability evaluation for heterogeneous WSN under malware infection [J ] . Chinese Journal of Sensors and Actuators , 2017 , 30 ( 7 ): 1100 - 1105 .
沈士根 , 范恩 , 胡珂立 , 等 . 面向恶意程序传播的传感网可靠度评估 [J ] . 电子学报 , 2018 , 46 ( 1 ): 75 - 81 .
SHEN S G , FAN E , HU K L , et al . Reliability evaluation for WSN with malware spread [J ] . Acta Electronica Sinica , 2018 , 46 ( 1 ): 75 - 81 .
沈士根 , 周海平 , 黄龙军 , 等 . 基于最优反应均衡的传感网恶意程序传播抑制方法 [J ] . 传感技术学报 , 2017 , 30 ( 10 ): 1589 - 1595 .
SHEN S G , ZHOU H P , HUANG L J , et al . Quantal response equilibrium-based method for preventing WSN malware infection [J ] . Chinese Journal of Sensors and Actuators , 2017 , 30 ( 10 ): 1589 - 1595 .
ILLIANO V P , LUPU E C . Detecting malicious data injections in wireless sensor networks:a survey [J ] . ACM Computing Surveys , 2015 , 48 ( 2 ):33.
YANG Y , ZHU S , CAO G . Improving sensor network immunity under worm attacks:a software diversity approach [J ] . Ad Hoc Networks , 2016 ,( 47 ): 26 - 40 .
GHOSAL A , HALDER S . A survey on energy efficient intrusion detection in wireless sensor networks [J ] . Journal of Ambient Intelligence and Smart Environments , 2017 , 9 ( 2 ): 239 - 261 .
ZARPELÃO B B , MIANI R S , KAWAKANI C T , et al . A survey of intrusion detection in Internet of things [J ] . Journal of Network and Computer Applications , 2017 ( 84 ): 25 - 37 .
曹旭 , 曹瑞彤 . 基于大数据分析的网络异常检测方法 [J ] . 电信科学 , 2014 , 30 ( 6 ): 152 - 156 .
CAO X , CAO R T . Network anomaly prediction method based on big data [J ] . Telecommunications Science , 2014 , 30 ( 6 ): 152 - 156 .
柳毅 , 洪俊斌 . 基于网络爬虫与页面代码行为的XSS漏洞动态检测方法 [J ] . 电信科学 , 2016 , 32 ( 3 ): 87 - 91 .
LIU Y , HONG J B . A dynamic detection method based on Web crawler and page code behavior for XSS vulnerability [J ] . Telecommunications Science , 2016 , 32 ( 3 ): 87 - 91 .
李传煌 , 孙正君 , 袁小雍 , 等 . 基于深度学习的实时DDoS攻击检测 [J ] . 电信科学 , 2017 , 33 ( 7 ): 53 - 65 .
LI C H , SUN Z J , YUAN X Y , et al . Real-time DDoS attack detection based on deep learning [J ] . Telecommunications Science , 2017 , 33 ( 7 ): 53 - 65 .
汪来富 , 金华敏 , 刘东鑫 , 等 . 面向网络大数据的安全分析技术应用 [J ] . 电信科学 , 2017 , 33 ( 3 ): 112 - 118 .
WANG L F , JIN H M , LIU D X , et al . Application of security analysis technology for network big data [J ] . Telecommunications Science , 2017 , 33 ( 3 ): 112 - 118 .
刘建华 , 李明禄 , 李大志 , 等 . 工业无线传感云中面向移动机器人的自适应信任演化机制 [J ] . 电信科学 , 2017 , 33 ( 6 ): 86 - 96 .
LIU J H , LI M L , LI D Z , et al . Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud [J ] . Telecommunications Science , 2017 , 33 ( 6 ): 86 - 96 .
IQBAL S , MAT KIAH M L , DHAGHIGHI B , et al . On cloud security attacks:a taxonomy and intrusion detection and prevention as a service [J ] . Journal of Network and Computer Applications , 2016 ( 74 ): 98 - 120 .
SUN H , WANG X , BUYYA R , et al . CloudEyes:cloud-based malware detection with reversible sketch for resource- constrained internet of things (IoT) devices [J ] . Software- Practice and Experience , 2017 , 47 ( 3 ): 421 - 441 .
王晋东 , 余定坤 , 张恒巍 , 等 . 静态贝叶斯博弈主动防御策略选取方法 [J ] . 西安电子科技大学学报 , 2016 , 43 ( 1 ): 144 - 150 .
WANG J D , YU D K , ZHANG H W , et al . Active defense strategy selection based on the static Bayesian game [J ] . Journal of Xidian University , 2016 , 43 ( 1 ): 144 - 150 .
刘玉岭 , 冯登国 , 吴丽辉 , 等 . 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估 [J ] . 软件学报 , 2012 , 23 ( 3 ): 712 - 723 .
LIU Y L , FENG D G , WU L H , et al . Performance evaluation of worm attack and defense strategies based on static Bayesian game [J ] . Journal of Software , 2012 , 23 ( 3 ): 712 - 723 .
沈士根 , 黄龙军 , 胡珂立 , 等 . 基于微分博弈的在线社交网络恶意程序传播优化控制方法 [J ] . 电信科学 , 2015 , 31 ( 10 ): 66 - 73 .
SHEN S G , HUANG L J , HU K L , et al . Differential game-based optimal control method for preventing malware propagation in online social network [J ] . Telecommunications Science , 2015 , 31 ( 10 ): 66 - 73 .
张恒巍 , 李涛 . 基于多阶段攻防信号博弈的最优主动防御 [J ] . 电子学报 , 2017 , 45 ( 2 ): 431 - 439 .
ZHANG H W , LI T . Optimal active defense based on multi-stage attack-defense signaling game [J ] . Acta Electronica Sinica , 2017 , 45 ( 2 ): 431 - 439 .
黄健明 , 张恒巍 , 王晋东 , 等 . 基于攻防演化博弈模型的防御策略选取方法 [J ] . 通信学报 , 2017 , 38 ( 1 ): 168 - 176 .
HUANG J M , ZHANG H W , WANG J D , et al . Defense strategies selection based on attack-defense evolutionary game model [J ] . Journal of Communications , 2017 , 38 ( 1 ): 168 - 176 .
SPYRIDOPOULOS T , MARASLIS K , MYLONAS A , et al . A game theoretical method for cost-benefit analysis of malware dissemination prevention [J ] . Information Security Journal , 2015 , 24 ( 4-6 ): 164 - 176 .
YUAN Y , SUN F , LIU H . Resilient control of cyber-physical systems against intelligent attacker:a hierarchal stackelberg game approach [J ] . International Journal of Systems Science , 2016 , 47 ( 9 ): 2067 - 2077 .
周恒杰 , 孙闽红 , 钟华 , 等 . 基于不完全信息动态博弈的多信道无线网络抗干扰传输 [J ] . 电信科学 , 2018 , 34 ( 2 ): 39 - 45 .
ZHOU H J , SUN M H , ZHONG H , et al . Anti-jamming transmission in a multi-channel wireless network based on incomplete information dynamic game [J ] . Telecommunications Science , 2018 , 34 ( 2 ): 39 - 45 .
WANG K , DU M , YANG D , et al . Game-theory-based active defense for intrusion detection in cyber-physical embedded systems [J ] . ACM Transactions on Embedded Computing Systems , 2016 , 16 ( 1 ): 18 - 21 .
NAUMAN M , AZAM N , YAO J . A three-way decision making approach to malware analysis using probabilistic rough sets [J ] . Information Sciences , 2016 ( 374 ): 193 - 209 .
HAYEL Y , ZHU Q . Epidemic protection over heterogeneous networks using evolutionary poisson games [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 8 ): 1786 - 1800 .
0
浏览量
799
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构