Abstract
With the development of the Internet of Things and the pervasive use of internet service providers (ISPs), internet users and data have reached an unprecedented volume. However, the existence of malicious users seriously undermine user privacy and network security by distributing a large amount of unwanted traffic, such as spam, pop-up, and malware. This to some extent can be identified with the cooperation of individual users by installing anti-virus toolkits. However, users need to purchase such software at an additional cost. Therefore, unless built-in incentive mechanisms exist, rational users will choose not to install virus software. If enough network entities behave in this way, the network will be flooded with unwanted traffic. In this paper, we propose an evolutionary game theoretic incentive mechanism to promote the cooperation of individual users to curb the expansion of unwanted traffic. We propose a combined reward and punishment mechanism to further incentivize cooperative behavior. Meanwhile, the acceptance condition of our framework is analyzed and we carry out a number of simulations to evaluate the acceptance conditions of our framework.The experimental results indicate that our reward and punishment mechanism can efficiently incentivize users to adopt cooperative behavior and reduce unwanted traffic.
Similar content being viewed by others
References
Ahmed AA, Jantan A, Wan TC (2015) Filtration model for the detection of malicious traffic in large-scale networks. Comput Commun 82:59–70
Al-Duwairi B, Khater I, Al-Jarrah O (2012) Detecting image spam using image texture features. Int J Inf Secur Res (IJISR) 2(3/4):344–353
Chen Y, Crespi N, Ortiz AM, Shu L (2017) Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Inform Sci 379:82–93
Chen Y, Lee GM, Lei S, Crespi N (2016) Industrial internet of things-based collaborative sensing intelligence: framework and research challenges. Sensors 16(2):215
Chen Y, Shu L, Crespi N, Lee GM, Guizani M (2016) Understanding the impact of network structure on propagation dynamics based on mobile big data, 1018–1023
Fan Y, Ye Y, Chen L (2016) Malicious sequential pattern mining for automatic malware detection. Pergamon Press, Inc.
Hou YT, Chang Y, Chen T, Laih CS, Chen CM (2010) Malicious web content detection by machine learning. Expert Syst Appl 37(1):55–60
Huda S, Miah S, Yearwood J, Alyahya S, Al-Dossari H, Doss R (2018) A malicious threat detection model for cloud assisted internet of things (cot) based industrial control system (ics) networks using deep belief network. J Parallel Distrib Comput, 120
Jiang G, Shen S, Hu K, Huang L, Li H, Han R (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sensor Netw 2015:25
Jianzhong Z, Xu W, Yudi P, Xu Ji (2010) Mailtrust: a mail reputation mechanism based on improved trustguard. In: 2010 International conference on communications and mobile computing (CMC), vol 1. IEEE, pp 218–222
Kim S, Kim J, Kang BH (2018) Malicious url protection based on attackers’ habitual behavioral analysis. Computers & Security
Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25
Shen Y, Yan Z, Kantola R (2014) Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput Secur 47:3–25
Shu L, Chen Y, Sun Z, Tong F, et al. (2017) Detecting the dangerous area of toxic gases with wireless sensor networks. IEEE Transactions on Emerging Topics in Computing
Singh K, Guntuku SC, Thakur A, Hota C (2014) Big data analytics framework for peer-to-peer botnet detection using random forests. Inform Sci 278:488–497
Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defence framework against dos/ddos cyber attacks. Comput Secur 38:39–50
Srivastava V, Neel JO, MacKenzie AB, Menon R, DaSilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutor 7(1-4):46–56
Szolnoki A, Perc M (2012) Conditional strategies and the evolution of cooperation in spatial public goods games. Phys Rev E 85(2):026–104
Tian C, Yang B, Zhong J, Liu X (2014) Trust-based incentive mechanism to motivate cooperation in hybrid p2p networks. Comput Netw 73:244–255
Wang Y, Nakao A, Vasilakos AV, Ma J (2011) On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous p2p networks. Comput Netw 55(17):3811–3831
Weibull JW (1997) Evolutionary game theory. MIT press
Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In: International conference on computing, management and telecommunications, pp 289–294
Xu X, Wang Q, Cao J, Wan PJ (2012) Locating malicious nodes for data aggregation in wireless networks. In: IEEE INFOCOM, pp 3056–3060
Yan Z, Kantola R, Shen Y (2011) Unwanted traffic control via global trust management. In: 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 647–654
Yan Z, Kantola R, Shen Y (2012) Unwanted traffic control via hybrid trust management. In: 11th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 666–673
Yan Z, Kantola R, Shen Y (2014) A generic solution for unwanted traffic control through trust management. Rev Hypermed Multimed 20(1):25–51
Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Trans Depend Secur Comput 8(6):810–823
Bo Z, Li Q, Ma Y (2017) Research on dynamic heuristic scanning technique and the application of the malicious code detection model. Inf Process Lett 117:19–24
Zhao BQ, Lui JCS, Chiu D-M (2012) A mathematical framework for analyzing adaptive incentive protocols in p2p networks. IEEE/ACM Trans Network 20(2):367–380
Zheleva E, Kolcz A, Getoor L (2008) Trusting spam reporters: a reporter-based reputation system for email filtering. ACM Trans Inf Syst (TOIS) 27(1):1–37
Acknowledgements
This work is supported by the National Science Foundation of China (Grant No. 61802097), and the Natural Science Foundation of Jiangsu Province (No. BK20131277).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, J., Li, M., Alam, M. et al. A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism. Mobile Netw Appl 24, 1279–1294 (2019). https://doi.org/10.1007/s11036-018-1166-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1166-0