Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/8340
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Narang, Pratik | - |
dc.date.accessioned | 2023-01-06T07:06:31Z | - |
dc.date.available | 2023-01-06T07:06:31Z | - |
dc.date.issued | 2015-07 | - |
dc.identifier.uri | https://link.springer.com/article/10.1007/s10796-015-9582-1 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8340 | - |
dc.description.abstract | This work studies the problem of optimal positioning of Intrusion Detection Systems (IDSs) in a Peer-to-Peer (P2P) environment involving a number of peers and super-peers. This scenario applies to network architectures like that of Gnutella, Skype or Tor, which involve a huge number of leaf-peers and a selected number of super-peers who have higher responsibilities in the network. A malicious entity may become part of the P2P network by joining from any part of the network. It can attack a super-peer and thus disrupt the functioning of the P2P network. Peers may try to secure the network by running IDSs at certain strategically-chosen locations in the network. But a deterministic schedule of running and positioning the IDSs can be observed and thwarted by an adversary. In this paper, we explore the problem of strategically positioning IDSs in a P2P network with a randomized, game-theoretic approach. Our approach distributes the responsibility of running the IDSs between the peers in a randomized fashion and minimizes the probability of a successful attack. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Peer-to-Peer (P2P) | en_US |
dc.subject | Game-theoretic | en_US |
dc.subject | IDS deployment | en_US |
dc.title | Game-theoretic strategies for IDS deployment in peer-to-peer networks | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.