Filters








359 Hits in 6.8 sec

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar, James Joshi, David Tipper
2013 IEEE Communications Surveys and Tutorials  
Once an attack army has been set up, an attacker can invoke a coordinated, large-scale attack against one or more targets.  ...  Moreover, we highlight the need for a comprehensive distributed and collaborative defense approach.  ...  ACKNOWLEDGMENT The authors would like to thank anonymous reviewers for their constructive comments and valuable suggestions.  ... 
doi:10.1109/surv.2013.031413.00127 fatcat:tjnielpldfdazdnxtvxvy4so2e

Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management [chapter]

Patrick Maillé, Peter Reichl, Bruno Tuffin
2010 Performance Models and Risk Management in Communications Systems  
against DDOS) which are of central relevance for any risk assessment purposes.  ...  Similarly, the stochastic game approach is used in [17] to model attacks directed against specific applications, against communication capacities, or against databases.  ... 
doi:10.1007/978-1-4419-0534-5_2 fatcat:s37ykxheprb2vecjz53usg6zoe

Incentive-based modeling and inference of attacker intent, objectives, and strategies

Peng Liu, Wanyu Zang
2003 Proceedings of the 10th ACM conference on Computer and communication security - CCS '03  
In this paper, we present a general incentive-based method to model AIOS and a game theoretic approach to infer AIOS.  ...  On one hand, we found that the concept of incentives can unify a large variety of attacker intents; the concept of utilities can integrate incentives and costs in such a way that attacker objectives can  ...  Although when market-based mechanisms are used to defend against attackers [31] , the AIOS are incentive-based, which is consistent with our framework, market-based computing does not imply an in-depth  ... 
doi:10.1145/948134.948135 fatcat:oqhje2phw5glxarplcbdcmzdsi

Incentive-based modeling and inference of attacker intent, objectives, and strategies

Peng Liu, Wanyu Zang
2003 Proceedings of the 10th ACM conference on Computer and communication security - CCS '03  
In this paper, we present a general incentive-based method to model AIOS and a game theoretic approach to infer AIOS.  ...  On one hand, we found that the concept of incentives can unify a large variety of attacker intents; the concept of utilities can integrate incentives and costs in such a way that attacker objectives can  ...  Although when market-based mechanisms are used to defend against attackers [31] , the AIOS are incentive-based, which is consistent with our framework, market-based computing does not imply an in-depth  ... 
doi:10.1145/948109.948135 dblp:conf/ccs/LiuZ03 fatcat:dk4d2wqt7vhcven7xe3rsfmug4

Incentive-based modeling and inference of attacker intent, objectives, and strategies

Peng Liu, Wanyu Zang, Meng Yu
2005 ACM Transactions on Privacy and Security  
In this paper, we present a general incentive-based method to model AIOS and a game theoretic approach to infer AIOS.  ...  On one hand, we found that the concept of incentives can unify a large variety of attacker intents; the concept of utilities can integrate incentives and costs in such a way that attacker objectives can  ...  Although when market-based mechanisms are used to defend against attackers [31] , the AIOS are incentive-based, which is consistent with our framework, market-based computing does not imply an in-depth  ... 
doi:10.1145/1053283.1053288 fatcat:aaulepj4jjg6vonadplnrk4dc4

After we knew it

Su Zhang, Xinwen Zhang, Xinming Ou
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
defending attacks.  ...  incentive; Fortunately, on the other hand, cloud defenders (cloud providers and customers) also have much lower cost-loss ratio than in traditional environment, therefore they can be more effective for  ...  For each DDoS attack, the cost can be up to $100M [28] .  ... 
doi:10.1145/2590296.2590300 dblp:conf/ccs/ZhangZO14 fatcat:jm6iwffhojgt7iffxil64hnzfi

Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts [article]

Z. Motaqy, G. Almashaqbeh, B. Bahrak, N.Yazdani
2021 arXiv   pre-print
In this paper, we bridge this gap and introduce a smart contract-based framework that allows a sponsor to orchestrate a collaborative attack among (pseudo)anonymous attackers and reward them for that.  ...  We also model our framework and its reward function as an incentive mechanism and prove that it is a strategy proof and budget-balanced one.  ...  Budget Constraint To be economically feasible, an incentive mechanism must be budget constrained.  ... 
arXiv:2010.12280v4 fatcat:djnpmoqxtrc4rdjw7mkkchajka

Rethinking Business Model in Cloud Computing: Concept and Example

Ping DU, Akihiro NAKAO
2011 IEICE transactions on information and systems  
We posit that such a cloud computing system is vulnerable to DDoS (Distributed Denial-of-Service) attacks against quota.  ...  We design and prototype such a charging model in a CoreLab testbed infrastructure and show an example application. key words: cloud computing, denial-of-quota attacks, pay-as-you-admit  ...  Conclusion and Future Work We propose pay-as-you-admit charging model that serves as an alternative charging scheme for cloud computing to defend DDoS attacks against quota and to avoid improper charge  ... 
doi:10.1587/transinf.e94.d.2119 fatcat:nbkc4enab5hvfo4yoasv4bznpq

A Survey of Game Theory as Applied to Network Security

Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu
2010 2010 43rd Hawaii International Conference on System Sciences  
Researchers have been exploring the applicability of game theoretic approaches to address the network security issues and some of these approaches look promising.  ...  This paper surveys the existing game theoretic solutions which are designed to enhance network security and presents a taxonomy for classifying the proposed solutions.  ...  An incentive-based game-theoretic model to infer AIOS was discussed in this work.  ... 
doi:10.1109/hicss.2010.35 dblp:conf/hicss/RoyESDSW10 fatcat:hom3hguma5a4nji65wdcoiseoq

Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity

Justin K Haner, Robert K Knake
2021 Journal of Cybersecurity  
Malicious networks of botnets continue to grow in strength as millions of new users and devices connect to the internet each day, many becoming unsuspectingly complicit in cyber-attacks or unwitting accomplices  ...  Both states and nonstate actors use botnets to surreptitiously control the combined computing power of infected devices to engage in espionage, hacking, and to carry out distributed denial of service attacks  ...  The authors declare no conflict of interest or specific sources of funding for this research.  ... 
doi:10.1093/cybsec/tyab003 fatcat:kciksuavlbb7tgslydzvmhqv34

Analyzing distributed denial of service attacks in cloud computing towards the Pakistan information technology industry

Kamran Ali Memon, chool of Electronic Engineering, Beijing University of Posts and Telecommunications,China
2020 Indian Journal of Science and Technology  
Material/methods: We have proposed the mathematical-based model for an estimate of our user's requirements regarding our resource investment based on queuing theory to overcome these security issues in  ...  phenomena, we also used DST and FTA (Fault Tree Analysis) for mentioned attacks.  ...  Another study presents that EDoS (Economic Denial of Sustainability) attack is the primary form of DDoS attack in cloud (10) . Therefore this EDoS can be studied to protect against DDoS attacks.  ... 
doi:10.17485/ijst/v13i29.1040 fatcat:b6lxr2uphzddtn3l62lkaxd7qy

Survey of network-based defense mechanisms countering the DoS and DDoS problems

Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
2007 ACM Computing Surveys  
We review the state-of-art mechanisms for defending against denial of service attacks, compare the strengths and weaknesses of each proposal, and discuss potential countermeasures against each defense  ...  We conclude by highlighting opportunities for an integrated solution to solve the problem of distributed denial of service attacks.  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for their excellent suggestions that have greatly improved the quality of this article.  ... 
doi:10.1145/1216370.1216373 fatcat:fgim4prdsnbufbaavvptpvgkhq

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
In this paper, we review economic and pricing approaches proposed to address major security issues in wireless networks including eavesdropping attack, Denial-of-Service (DoS) attack such as jamming and  ...  While the security issues have not been completely solved by traditional or system-based solutions, economic and pricing models recently were employed as one efficient solution to discourage attackers  ...  For example, it allows a defender to decide an optimal strategy after observing the strategy of an attacker [36] .  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

On market concentration and cybersecurity risk

Dan Geer, Eric Jardine, Eireann Leverett
2020 Journal of Cyber Policy  
As the Internet ecosystem becomes more concentrated across a number of vectors from users and incoming links to economic market share, the locus of cyber risk moves towards these major hubs and the volume  ...  of systemic cyber risk increases.  ...  At the 459th attack, Organization C still has a 63.18 per cent chance of successfully defending against all attempted intrusions.  ... 
doi:10.1080/23738871.2020.1728355 fatcat:hmhqs6zeavflzagya2yz6xrjki

Adversarial genetic programming for cyber security: a rising application domain where GP matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Genetic Programming and Evolvable Machines  
Its goal is to elucidate the dynamics of cyber networks under attack by computationally modeling and simulating them.  ...  Additionally, it prompts research questions around evolving complex behavior by expressing different abstractions with GP and opportunities to reconnect to the Machine Learning, Artificial Life, Agent-Based  ...  This material is based upon work supported by DARPA.  ... 
doi:10.1007/s10710-020-09389-y fatcat:pptcxqfc6zeptdstzl3ipewrym
« Previous Showing results 1 — 15 out of 359 results