Standard

Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities. / GARNAEV, ANDREY; Trappe, Wade; Stojadinovic, D.; Seskar, I.

40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Institute of Electrical and Electronics Engineers Inc., 2015. стр. 1742-1746.

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучнаяРецензирование

Harvard

GARNAEV, ANDREY, Trappe, W, Stojadinovic, D & Seskar, I 2015, Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities. в 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Institute of Electrical and Electronics Engineers Inc., стр. 1742-1746. https://doi.org/10.1109/ICASSP.2015.7178269, https://doi.org/10.1109/ICASSP.2015.7178269

APA

GARNAEV, ANDREY., Trappe, W., Stojadinovic, D., & Seskar, I. (2015). Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities. в 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (стр. 1742-1746). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICASSP.2015.7178269, https://doi.org/10.1109/ICASSP.2015.7178269

Vancouver

GARNAEV ANDREY, Trappe W, Stojadinovic D, Seskar I. Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities. в 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Institute of Electrical and Electronics Engineers Inc. 2015. стр. 1742-1746 https://doi.org/10.1109/ICASSP.2015.7178269, https://doi.org/10.1109/ICASSP.2015.7178269

Author

GARNAEV, ANDREY ; Trappe, Wade ; Stojadinovic, D. ; Seskar, I. / Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities. 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Institute of Electrical and Electronics Engineers Inc., 2015. стр. 1742-1746

BibTeX

@inproceedings{fe6b174d91eb4629b272de03a31d71b4,
title = "Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities",
abstract = "Detecting malicious users in dynamic spectrum access scenarios is a crucial problem that requires an intrusion detection system (IDS) that scans spectrum for malicious activities. In this paper we design a spectrum scanning protocol that incorporates knowledge about the scanning effectiveness across different bands, which can increase scanning efficiency. The adversary, however, can also exploit such knowledge to its advantage. To understand the interplay underlying this problem, we formulate a Bayesian model, where the IDS faces a scanning allocation dilemma: if the intruder has no knowledge, then all the bands are under equal threat, while if the intruder has complete knowledge, then less-protected bands are more likely to be threatened. We solve this dilemma and show the optimal IDS strategy switches between the optimal response to these threats. Finally, we show that the strategy might be sensitive to prior knowledge, which can be corrected by adapted learning.",
author = "ANDREY GARNAEV and Wade Trappe and D. Stojadinovic and I. Seskar",
year = "2015",
doi = "10.1109/ICASSP.2015.7178269",
language = "English",
pages = "1742--1746",
booktitle = "40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

RIS

TY - GEN

T1 - Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities

AU - GARNAEV, ANDREY

AU - Trappe, Wade

AU - Stojadinovic, D.

AU - Seskar, I.

PY - 2015

Y1 - 2015

N2 - Detecting malicious users in dynamic spectrum access scenarios is a crucial problem that requires an intrusion detection system (IDS) that scans spectrum for malicious activities. In this paper we design a spectrum scanning protocol that incorporates knowledge about the scanning effectiveness across different bands, which can increase scanning efficiency. The adversary, however, can also exploit such knowledge to its advantage. To understand the interplay underlying this problem, we formulate a Bayesian model, where the IDS faces a scanning allocation dilemma: if the intruder has no knowledge, then all the bands are under equal threat, while if the intruder has complete knowledge, then less-protected bands are more likely to be threatened. We solve this dilemma and show the optimal IDS strategy switches between the optimal response to these threats. Finally, we show that the strategy might be sensitive to prior knowledge, which can be corrected by adapted learning.

AB - Detecting malicious users in dynamic spectrum access scenarios is a crucial problem that requires an intrusion detection system (IDS) that scans spectrum for malicious activities. In this paper we design a spectrum scanning protocol that incorporates knowledge about the scanning effectiveness across different bands, which can increase scanning efficiency. The adversary, however, can also exploit such knowledge to its advantage. To understand the interplay underlying this problem, we formulate a Bayesian model, where the IDS faces a scanning allocation dilemma: if the intruder has no knowledge, then all the bands are under equal threat, while if the intruder has complete knowledge, then less-protected bands are more likely to be threatened. We solve this dilemma and show the optimal IDS strategy switches between the optimal response to these threats. Finally, we show that the strategy might be sensitive to prior knowledge, which can be corrected by adapted learning.

U2 - 10.1109/ICASSP.2015.7178269

DO - 10.1109/ICASSP.2015.7178269

M3 - Conference contribution

SP - 1742

EP - 1746

BT - 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

ID: 4727478