626 Hits in 5.0 sec

On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks

Qishi Wu, Sajjan Shiva, Sankardas Roy, Charles Ellis, Vivek Datla
2010 Proceedings of the 2010 Spring Simulation Multiconference on - SpringSim '10  
We validate the effectiveness of our game theoretic defense mechanisms via extensive simulation-based experiments using NS-3. 1 We assume that one single attacker controls all of the attacking nodes present  ...  We model the interaction between the attacker and the defender as a two-player non-zero-sum game in two attack scenarios: (i) one single attacking node for Denial of Service (DoS) and (ii) multiple attacking  ...  ACKNOWLEDGMENT This research is sponsored by the Office of Naval Research under Award No. N00014-09-1-0752 with University of Memphis.  ... 
doi:10.1145/1878537.1878703 fatcat:nqll726evrf65l7o2lcy3c75mi

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ajith Abraham
2014 Engineering applications of artificial intelligence  
The proposed model implements cooperative defense counter-attack scenarios for the sink node and the base station to operate as rational decision-maker players through a game theory strategy.  ...  It is a three-player strategy game consisting of sink nodes, a base station, and an attacker.  ...  Acknowledgment This paper is financially supported by the Malaysian Ministry of Education under the University of Malaya High Impact Research Grant -UM.C/HIR/MOHE/FCSIT/12.  ... 
doi:10.1016/j.engappai.2014.02.001 fatcat:rmptixo7hnbinjsouowowhjpri

Secure Framework for DDoS Attack Detection and Defense in IEEE 802.11 WLAN

S. Suganthi, M. Aramudhan
2015 Research Journal of Applied Sciences Engineering and Technology  
In this study, we propose to design a detection and defense mechanism against DDoS attacks.  ...  Initially GIDA module is deployed, so that DDoS attack is detected using the game theory decision model in the Access Point (AP).  ...  Game theory based DDoS attack detection: The Game theory based DDoS attack detection is a decision module (Bedi et al., 2011) which analyzes the incoming flow for UDP flooding attack by restricting or  ... 
doi:10.19026/rjaset.10.1868 fatcat:vnpw22pybjbvjm5dbilog7pioa

DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective

Zhaobin Li, Bin Yang, Xinyu Zhang, Chao Guo, Zhen Wang
2022 Security and Communication Networks  
The proposed game model's Nash equilibrium is solved based on the different costs and payoffs of each method. We simulated the attack and defense of DDoS in Ryu controller and Mininet.  ...  This paper designs different defense methods for different DDoS attacks and constructs a multitype DDoS defense model based on a dynamic Bayesian game in the Software-Defined Space-Air-Ground Integrated  ...  Acknowledgments is work was supported by the State Key Laboratory of Integrated Services Networks, Xidian University (ISN22-13), and the Higher Education Department of the Ministry of Education Industry-university  ... 
doi:10.1155/2022/1886516 fatcat:6ifow5rvxfa5hiniklbgtbfoq4

A cost-effective shuffling method against DDoS attacks using Moving Target Defense [article]

Yu-Yang Zhou, Guang Cheng
2019 arXiv   pre-print
Moving Target Defense(MTD) has emerged as a good solution to alter the asymmetric situation of attacks and defenses, shuffling-based moving target defense has been regarded as one of the most effective  ...  Finally, simulation and experiment on an experimental SDN network indicate that, our approach imposes an acceptable shuffling overload and has a good effect on resisting DDoS attacks.  ...  Threat Model In this section, we describe a threat model to characterize the behavior of attackers and moving target defense mechanism.  ... 
arXiv:1903.10102v2 fatcat:bga3fmmptzevhgc4ih3b7bnu4u

A Game-Theoretic Approach for AI-based Botnet Attack Defence [article]

Hooman Alavizadeh and Julian Jang-Jaccard and Tansu Alpcan and Seyit A. Camtepe
2021 arXiv   pre-print
In this paper, we propose a sequential game theory model that is capable to analyse the details of the potential strategies botnet attackers and defenders could use to reach Nash Equilibrium (NE).  ...  We conduct a numerical analysis based on a various number of defense strategies involved on different (simulated) cloud-band sizes in relation to different attack success rate values.  ...  In [14], a game theory-based model was presented as a defense mechanism against a classic bandwidth-consuming DoS/DDoS attack, which validates the model using NS-3 network simulation tools.  ... 
arXiv:2112.02223v1 fatcat:jvai56j6vfbixhaqmcije6qpze

Moving Target Defense-Based Denial-of-Service Mitigation in Cloud Environments: A Survey

Minh Nguyen, Saptarshi Debroy, AnMin Fu
2022 Security and Communication Networks  
The concept of moving target defense (MTD) has recently emerged as an effective and agile defense mechanism against DoS attacks that particularly target cloud-hosted applications.  ...  Unlike existing surveys, we categorize DoS attacks on cloud platforms based on their working mechanism.  ...  In [112] , Zhou et al. proposed a new cost-effective shuffling (CES) method against DDoS attacks using MTD based on game theory.  ... 
doi:10.1155/2022/2223050 fatcat:3figtl7ju5ezjbn3gwvzhjxj4e

Towards a bayesian network game framework for evaluating DDoS attacks and defense

Guanhua Yan, Ritchie Lee, Alex Kent, David Wolpert
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
We conduct a variety of experiments to evaluate DDoS attack and defense scenarios where one or more layers of defense mechanisms are deployed, and demonstrate that our framework sheds light on the interplay  ...  between decision makings of both the attacker and the defender, as well as how they affect the outcomes of DDoS attack and defense games.  ...  ) and NASA Aviation Safety Program SSAT project.  ... 
doi:10.1145/2382196.2382255 dblp:conf/ccs/YanLKW12 fatcat:dzhls36qtjhsvfzgzsqcifsodm

ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy [chapter]

Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya
2013 IFIP Advances in Information and Communication Technology  
Game theory has been researched extensively in network security demonstrating an advantage of modeling the interactions between attackers and defenders.  ...  One of the pressing issues in composing a game theoretic defense system is the development of consistent quantifiable metrics to select the best game theoretic defense model.  ...  Due to the nature of the DDoS attack, the most common defense against DDoS attacks is to block nodes. Parameswaran, et al.  ... 
doi:10.1007/978-3-642-39218-4_26 fatcat:czst4ssvwvacxmezieuxehkd7e

Overview on MTD technology based on game theory

Yan Sun, Weifeng Ji, Jiang Weng, Beiying Zhao, J. Joo
2020 MATEC Web of Conferences  
The decision method of network defense based on game theory is an important technique to guide MTD to make the optimal defense behavior in different network environments (GT-MTD).  ...  In this paper, we focus on the scope and field of GT-MTD, systematically introduce the application scenarios of MTD in combination with four different game theory models of classical games (static games  ...  [26] advocate that defenders should take active actions to prevent DDoS attacks. A new model based on differential game theory is proposed.  ... 
doi:10.1051/matecconf/202030902012 fatcat:s22rojswiveenhv6s6yqbahgqe

A Holistic Game Inspired Defense Architecture [chapter]

Sajjan Shiva, Harkeerat Singh Bedi, Chris B. Simmons, Marc Fisher, Ramya Dharam
2012 Lecture Notes in Electrical Engineering  
We consider the interaction between the attacks and the defense mechanisms as a game played between the attacker and the defender.  ...  We discuss one implementation of our holistic approach, namely, game inspired defense architecture in which a game decision model decides the best defense strategies for the other components in the system  ...  Our experimentation [10, 14] included modeling and simulation of game theory-based solutions against DoS and DDoS attacks.  ... 
doi:10.1007/978-3-642-28798-5_63 fatcat:woo7efs7lrevxalwoutnognxnm

Countermeasure against Distributed Denial of Service Attack

Gaoping Hu
2017 DEStech Transactions on Engineering and Technology Research  
A DDoS attack is simulated by flooding the mincut arcs in the network.  ...  Although a lot of research has been done in this field, these attacks remain one of the most common threats affecting network performance.  ...  One defense against DDoS attacks is to make attacks infeasible for an attacker, by increasing either the amount of attack traffic needed to disable a link or the number of attackers needed to disable the  ... 
doi:10.12783/dtetr/apetc2017/10920 fatcat:ofsctcefdrfc3dj73y5dl5boty

Methodologies for evaluating game theoretic defense against DDoS attacks

Tanmay Khirwadkar, Kien C. Nguyen, David M. Nicol, Tamer Basar
2010 Proceedings of the 2010 Winter Simulation Conference  
This paper considers a methodology for evaluating a game-theoretic defense against DDoS.  ...  Distributed Denial of Service (DDoS) attacks on the Internet are used by attackers to be a nuisance, make a political statement (e.g. the 2009 attack against Estonia), or as a weapon of an Internet extortionist  ...  We have modeled DDoS attacks and the pushback mechanism as a 2-player game between the Attacker and the System.  ... 
doi:10.1109/wsc.2010.5680886 dblp:conf/wsc/KhirwadkarNNB10 fatcat:gwcvsmwtxfggdl5nnv7tgxwf6u

Game strategies for distributed denial of service defense in the Cloud of Things

Yichuan Wang, Yefei Zhang, Xinhong Hei, Wenjiang Ji, Weigang Ma
2016 Journal of Communications and Information Networks  
We propose a novel game theory model to describe the CoT attacker, who expects to use minimum set and energy consumption of IoT attack devices to occupy as many bandwidth resources as possible in a given  ...  The best strategy for each stage of the attack is to adjust the attack link number dynamically based on the comparison results of value and turning point for each time period.  ...  defense mechanism should be deployed in the SG against the IoT DDoS attack.  ... 
doi:10.1007/bf03391587 fatcat:2cseibghabc3lixuv7verhiaju

A Survey of Game Theory as Applied to Network Security

Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu
2010 2010 43rd Hawaii International Conference on System Sciences  
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two decades.  ...  Researchers have been exploring the applicability of game theoretic approaches to address the network security issues and some of these approaches look promising.  ...  Mirkovic and Reihner [27] presented a taxonomy of Distributed Denial of Services (DDoS) attack and defense mechanisms in aim to classify attacks and defense strategies.  ... 
doi:10.1109/hicss.2010.35 dblp:conf/hicss/RoyESDSW10 fatcat:hom3hguma5a4nji65wdcoiseoq
« Previous Showing results 1 — 15 out of 626 results