Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)

Model of Intrusion Detection Based on the Game Theory

Authors
Heng Xiao, Caofang Long
Corresponding Author
Heng Xiao
Available Online March 2013.
DOI
10.2991/iccsee.2013.529How to use a DOI?
Keywords
Ad hoc, game theory, Nash equilibrium, repeated game
Abstract

With the development of network application, network security is facing greater pressure. Based on the characteristics of intrusion detection in the wireless network of the Ad hoc working group, the article introduces the game theory, proposes a game model of network security, concluds the Nash equilibrium in the stage game, repeats game, the pareto Nash equilibrium, more attack both income and payment, so that they get the best choice.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
Series
Advances in Intelligent Systems Research
Publication Date
March 2013
ISBN
978-90-78677-61-1
ISSN
1951-6851
DOI
10.2991/iccsee.2013.529How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Heng Xiao
AU  - Caofang Long
PY  - 2013/03
DA  - 2013/03
TI  - Model of Intrusion Detection Based on the Game Theory
BT  - Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
PB  - Atlantis Press
SP  - 2101
EP  - 2104
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccsee.2013.529
DO  - 10.2991/iccsee.2013.529
ID  - Xiao2013/03
ER  -