DSpace Repository

Game-theoretic strategies for IDS deployment in peer-to-peer networks

Show simple item record

dc.contributor.author Narang, Pratik
dc.date.accessioned 2023-01-06T07:06:31Z
dc.date.available 2023-01-06T07:06:31Z
dc.date.issued 2015-07
dc.identifier.uri https://link.springer.com/article/10.1007/s10796-015-9582-1
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8340
dc.description.abstract This work studies the problem of optimal positioning of Intrusion Detection Systems (IDSs) in a Peer-to-Peer (P2P) environment involving a number of peers and super-peers. This scenario applies to network architectures like that of Gnutella, Skype or Tor, which involve a huge number of leaf-peers and a selected number of super-peers who have higher responsibilities in the network. A malicious entity may become part of the P2P network by joining from any part of the network. It can attack a super-peer and thus disrupt the functioning of the P2P network. Peers may try to secure the network by running IDSs at certain strategically-chosen locations in the network. But a deterministic schedule of running and positioning the IDSs can be observed and thwarted by an adversary. In this paper, we explore the problem of strategically positioning IDSs in a P2P network with a randomized, game-theoretic approach. Our approach distributes the responsibility of running the IDSs between the peers in a randomized fashion and minimizes the probability of a successful attack. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.subject Computer Science en_US
dc.subject Peer-to-Peer (P2P) en_US
dc.subject Game-theoretic en_US
dc.subject IDS deployment en_US
dc.title Game-theoretic strategies for IDS deployment in peer-to-peer networks en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account