Telecommunications Science ›› 2018, Vol. 34 ›› Issue (9): 78-86.doi: 10.11959/j.issn.1000-0801.2018259
• research and development • Previous Articles Next Articles
Shigen SHEN1,Sheng FENG1,Haiping ZHOU1,Longjun HUANG1,Keli HU1,Qiying CAO2
Online:
2018-09-20
Published:
2018-10-12
Supported by:
Shigen SHEN,Sheng FENG,Haiping ZHOU,Longjun HUANG,Keli HU,Qiying CAO. Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game[J]. Telecommunications Science, 2018, 34(9): 78-86.
[1] | 罗军舟, 杨明, 凌振 ,等. 网络空间安全体系与关键技术[J]. 中国科学:信息科学, 2016,46(8): 939-968. LUO J Z , YANG M , LING Z ,et al. Architecture and key technologies of cyberspace security[J]. Scientia Sinica:Informationis, 2016,46(8): 939-968. |
[2] | 张焕国, 韩文报, 来学嘉 ,等. 网络空间安全综述[J]. 中国科学:信息科学, 2016,46(2): 125-164. ZHANG H G , HAN W B , LAI X J ,et al. Survey on cyberspace security[J]. Scientia Sinica:Informationis, 2016,46(2): 125-164. |
[3] | 沈士根, 黄龙军, 范恩 ,等. 受恶意程序传染的WSN可生存性评估[J]. 传感技术学报, 2016,29(7): 1083-1089. SHEN S G , HUANG L J , FAN E ,et al. Survivability evaluation for WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2016,29(7): 1083-1089. |
[4] | 沈士根, 刘建华, 曹奇英 . 博弈论与无线传感器网络安全[M]. 北京: 清华大学出版社, 2016. SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor networks security[M]. Beijing: Tsinghua University PressPress, 2016. |
[5] | 沈士根, 黄龙军, 周海平 ,等. 面向恶意程序传播的异质WSN 稳态可用度评估[J]. 传感技术学报, 2017,30(7): 1100-1105. SHEN S G , HUANG L J , ZHOU H P ,et al. Steady-state availability evaluation for heterogeneous WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(7): 1100-1105. |
[6] | 沈士根, 范恩, 胡珂立 ,等. 面向恶意程序传播的传感网可靠度评估[J]. 电子学报, 2018,46(1): 75-81. SHEN S G , FAN E , HU K L ,et al. Reliability evaluation for WSN with malware spread[J]. Acta Electronica Sinica, 2018,46(1): 75-81. |
[7] | 沈士根, 周海平, 黄龙军 ,等. 基于最优反应均衡的传感网恶意程序传播抑制方法[J]. 传感技术学报, 2017,30(10): 1589-1595. SHEN S G , ZHOU H P , HUANG L J ,et al. Quantal response equilibrium-based method for preventing WSN malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(10): 1589-1595. |
[8] | ILLIANO V P , LUPU E C . Detecting malicious data injections in wireless sensor networks:a survey[J]. ACM Computing Surveys, 2015,48(2):33. |
[9] | YANG Y , ZHU S , CAO G . Improving sensor network immunity under worm attacks:a software diversity approach[J]. Ad Hoc Networks, 2016,(47): 26-40. |
[10] | GHOSAL A , HALDER S . A survey on energy efficient intrusion detection in wireless sensor networks[J]. Journal of Ambient Intelligence and Smart Environments, 2017,9(2): 239-261. |
[11] | ZARPEL?O B B , MIANI R S , KAWAKANI C T ,et al. A survey of intrusion detection in Internet of things[J]. Journal of Network and Computer Applications, 2017(84): 25-37. |
[12] | 曹旭, 曹瑞彤 . 基于大数据分析的网络异常检测方法[J]. 电信科学, 2014,30(6): 152-156. CAO X , CAO R T . Network anomaly prediction method based on big data[J]. Telecommunications Science, 2014,30(6): 152-156. |
[13] | 柳毅, 洪俊斌 . 基于网络爬虫与页面代码行为的XSS漏洞动态检测方法[J]. 电信科学, 2016,32(3): 87-91. LIU Y , HONG J B . A dynamic detection method based on Web crawler and page code behavior for XSS vulnerability[J]. Telecommunications Science, 2016,32(3): 87-91. |
[14] | 李传煌, 孙正君, 袁小雍 ,等. 基于深度学习的实时DDoS攻击检测[J]. 电信科学, 2017,33(7): 53-65. LI C H , SUN Z J , YUAN X Y ,et al. Real-time DDoS attack detection based on deep learning[J]. Telecommunications Science, 2017,33(7): 53-65. |
[15] | 汪来富, 金华敏, 刘东鑫 ,等. 面向网络大数据的安全分析技术应用[J]. 电信科学, 2017,33(3): 112-118. WANG L F , JIN H M , LIU D X ,et al. Application of security analysis technology for network big data[J]. Telecommunications Science, 2017,33(3): 112-118. |
[16] | 刘建华, 李明禄, 李大志 ,等. 工业无线传感云中面向移动机器人的自适应信任演化机制[J]. 电信科学, 2017,33(6): 86-96. LIU J H , LI M L , LI D Z ,et al. Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud[J]. Telecommunications Science, 2017,33(6): 86-96. |
[17] | IQBAL S , MAT KIAH M L , DHAGHIGHI B ,et al. On cloud security attacks:a taxonomy and intrusion detection and prevention as a service[J]. Journal of Network and Computer Applications, 2016(74): 98-120. |
[18] | SUN H , WANG X , BUYYA R ,et al. CloudEyes:cloud-based malware detection with reversible sketch for resource- constrained internet of things (IoT) devices[J]. Software- Practice and Experience, 2017,47(3): 421-441. |
[19] | 王晋东, 余定坤, 张恒巍 ,等. 静态贝叶斯博弈主动防御策略选取方法[J]. 西安电子科技大学学报, 2016,43(1): 144-150. WANG J D , YU D K , ZHANG H W ,et al. Active defense strategy selection based on the static Bayesian game[J]. Journal of Xidian University, 2016,43(1): 144-150. |
[20] | 刘玉岭, 冯登国, 吴丽辉 ,等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012,23(3): 712-723. LIU Y L , FENG D G , WU L H ,et al. Performance evaluation of worm attack and defense strategies based on static Bayesian game[J]. Journal of Software, 2012,23(3): 712-723. |
[21] | 沈士根, 黄龙军, 胡珂立 ,等. 基于微分博弈的在线社交网络恶意程序传播优化控制方法[J]. 电信科学, 2015,31(10): 66-73. SHEN S G , HUANG L J , HU K L ,et al. Differential game-based optimal control method for preventing malware propagation in online social network[J]. Telecommunications Science, 2015,31(10): 66-73. |
[22] | 张恒巍, 李涛 . 基于多阶段攻防信号博弈的最优主动防御[J]. 电子学报, 2017,45(2): 431-439. ZHANG H W , LI T . Optimal active defense based on multi-stage attack-defense signaling game[J]. Acta Electronica Sinica, 2017,45(2): 431-439. |
[23] | 黄健明, 张恒巍, 王晋东 ,等. 基于攻防演化博弈模型的防御策略选取方法[J]. 通信学报, 2017,38(1): 168-176. HUANG J M , ZHANG H W , WANG J D ,et al. Defense strategies selection based on attack-defense evolutionary game model[J]. Journal of Communications, 2017,38(1): 168-176. |
[24] | SPYRIDOPOULOS T , MARASLIS K , MYLONAS A ,et al. A game theoretical method for cost-benefit analysis of malware dissemination prevention[J]. Information Security Journal, 2015,24(4-6): 164-176. |
[25] | YUAN Y , SUN F , LIU H . Resilient control of cyber-physical systems against intelligent attacker:a hierarchal stackelberg game approach[J]. International Journal of Systems Science, 2016,47(9): 2067-2077. |
[26] | 周恒杰, 孙闽红, 钟华 ,等. 基于不完全信息动态博弈的多信道无线网络抗干扰传输[J]. 电信科学, 2018,34(2): 39-45. ZHOU H J , SUN M H , ZHONG H ,et al. Anti-jamming transmission in a multi-channel wireless network based on incomplete information dynamic game[J]. Telecommunications Science, 2018,34(2): 39-45. |
[27] | WANG K , DU M , YANG D ,et al. Game-theory-based active defense for intrusion detection in cyber-physical embedded systems[J]. ACM Transactions on Embedded Computing Systems, 2016,16(1): 18-21. |
[28] | NAUMAN M , AZAM N , YAO J . A three-way decision making approach to malware analysis using probabilistic rough sets[J]. Information Sciences, 2016(374): 193-209. |
[29] | HAYEL Y , ZHU Q . Epidemic protection over heterogeneous networks using evolutionary poisson games[J]. IEEE Transactions on Information Forensics and Security, 2017,12(8): 1786-1800. |
[1] | Xue HAN. Damage toughness assessment method of power backbone communication network based on power big data [J]. Telecommunications Science, 2023, 39(5): 136-143. |
[2] | Jiangxing WU. Revolution of the development paradigm of network technology system—network of networks [J]. Telecommunications Science, 2022, 38(6): 3-12. |
[3] | Wenjuan XING, Bo LEI, Qianying ZHAO. Development status and trend prospect of computing power infrastructure [J]. Telecommunications Science, 2022, 38(6): 51-61. |
[4] | Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG. Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks [J]. Telecommunications Science, 2022, 38(6): 71-81. |
[5] | Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN. Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing [J]. Telecommunications Science, 2022, 38(12): 1-10. |
[6] | Cheng DING, Jinrong CHEN, Xiaodong CAO, Yi WANG. Quality of service based hierarchical resource allocation algorithm [J]. Telecommunications Science, 2022, 38(1): 102-111. |
[7] | Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG. Big data security features and operation practices [J]. Telecommunications Science, 2021, 37(5): 160-169. |
[8] | Xiaotong YE, Wenfei SUN, Shigen SHEN. Availability evaluation method for extended epidemic model and Markov chain based IoT [J]. Telecommunications Science, 2021, 37(4): 37-45. |
[9] | Jian XU,Li JIN. A quantifiable cloud computing platform security evaluation model [J]. Telecommunications Science, 2020, 36(7): 163-167. |
[10] | Yongyan LI,Jianping WU. Wireless sensor node localization based on IPSO-MC [J]. Telecommunications Science, 2020, 36(3): 11-18. |
[11] | Haoran LIU,Xingqi WANG,Yujing DENG,Yuhua QIN. Evaluation model of node importance in directed scale-free network based on cascade failure [J]. Telecommunications Science, 2020, 36(2): 43-51. |
[12] | Sining LUO,Hualong WANG,Hongyu LI,Wei PENG. Improved ant colony algorithm based cloud computing user task scheduling algorithm [J]. Telecommunications Science, 2020, 36(2): 95-100. |
[13] | Bo LEI, Zengyi LIU, Xuliang WANG, Mingchuan ·ANG, ·unqing CHEN. Computing network:a new multi-access edge computing [J]. Telecommunications Science, 2019, 35(9): 44-51. |
[14] | Yongmei GAO,Guanjie CHENG. Data-intensive service deployment based on edge computing [J]. Telecommunications Science, 2019, 35(7): 87-99. |
[15] | Zelin LU,Qiangzhi LI. Evolutionary logic and operational mechanism of E-commerce platform [J]. Telecommunications Science, 2019, 35(7): 152-158. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|