Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model

被引:0
|
作者
Qi, Chunyang [1 ]
Huang, Jie [1 ,2 ]
Huang, Cheng [3 ]
Wu, Huaqing [3 ]
Shen, Xuemin [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/GLOBECOM48099.2022.10000946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoTs generally rely on resource-constrained devices to sense, relay, and collect data, which are highly vulnerable to Distributed-Denial-of-Services (DDOS) attacks on network throughput. In this paper, we propose a trust-based method to optimize the network throughput of IoTs under DDOS attacks. Specifically, with the assistance of a small number of dedicatedly deployed defense nodes as defenders, a network controller can first measure the behavior of other IoT nodes and categorize them into three types (i.e., innocent, selfish, and attack) through a well-designed trust evaluation model. Then, a Stackelberg game model is constructed accordingly, where defenders are leaders and other nodes are followers. We carefully define the utilities of the leaders and the followers in the game, and transform the optimization problem of the network throughput into the maximization problem of the defenders' utilities considering the utilities of the followers. We adopt the Dinkelbach Programming (DP)-based algorithm to solve the maximization problem such that a Stackelberg equilibrium can be reached with optimized network throughput. Extensive simulations are performed to demonstrate that the proposed defense method can significantly increase the IoT network throughput under different DDOS attack intensities.
引用
收藏
页码:6259 / 6264
页数:6
相关论文
共 50 条
  • [21] An Intrusion Detection System Against DDoS Attacks in IoT Networks
    Roopak, Monika
    Tian, Gui Yun
    Chambers, Jonathon
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 562 - 567
  • [22] Scheme of defending against DDoS attacks in large-scale ISP networks
    Wu, Zhi-jun
    Zhang, Dong
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2007, 4672 : 296 - +
  • [23] A comprehensive study of DDoS attacks over IoT network and their countermeasures
    Kumari, Pooja
    Jain, Ankit Kumar
    COMPUTERS & SECURITY, 2023, 127
  • [24] Filtering spoofed traffic at source end for defending against DoS/DDoS attacks
    Malliga, S.
    Tamilarasi, A.
    Janani, M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 216 - 220
  • [25] A novel architecture for detecting and defending against flooding-based DDoS attacks
    Shi, Y
    Yang, XY
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 364 - 374
  • [26] METHODOLOGIES FOR EVALUATING GAME THEORETIC DEFENSE AGAINST DDOS ATTACKS
    Khirwadkar, Tanmay
    Nguyen, Kien C.
    Nicol, David M.
    Basar, Tamer
    PROCEEDINGS OF THE 2010 WINTER SIMULATION CONFERENCE, 2010, : 697 - 707
  • [27] Fight or Flight?: Defending against Sequential Attacks in the Game of Siege
    Deck, Cary
    Sheremeta, Roman M.
    JOURNAL OF CONFLICT RESOLUTION, 2012, 56 (06) : 1069 - 1088
  • [28] Defending DDoS attacks using network traffic analysis and probabilistic packet drop
    Seo, J
    Lee, C
    Moon, J
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 390 - 397
  • [29] An Efficient Multiplex Network Model for Effective Honeypot Roaming Against DDoS Attacks
    Ren, Jianguo
    Zhi, Qiang
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 1909 - 1921
  • [30] Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks
    Almaraz-Rivera, Josue Genaro
    Cantoral-Ceballos, Jose Antonio
    Botero, Juan Felipe
    SENSORS, 2023, 23 (21)