Research Article
Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs
Algorithm 1
QRE-based intrusion detection algorithm for IDS agents.
(1) ; | (2) Initialize game parameters required in Definition 2; | (3) Do UNTIL the end of interactions between players Attacker and the corresponding IDS agent | (4) Woken by Monitored Events; | (5) Judge whether Monitored Events are normal or malicious with the known intrusion detection techniques; | (6) IF the output of detection is malicious THEN | (7) IF the RIDG is not existed THEN | (8) Construct the first stage RIDG with game parameters including , , and ; | (9) ELSE | (10) Obtain the current stage RIDG from the Stored Game Data; | (11) ENDIF | (12) Compute according to (6); | (13) Compute according to (4) and store it into the Stored Game Data for the next stage RIDG; | (14) Combine IDS results and , and send them to Administrator; | (15) ENDIF | (16) ; | (17) ENDDO |
|