Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model

被引:0
|
作者
Qi, Chunyang [1 ]
Huang, Jie [1 ,2 ]
Huang, Cheng [3 ]
Wu, Huaqing [3 ]
Shen, Xuemin [3 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1109/GLOBECOM48099.2022.10000946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoTs generally rely on resource-constrained devices to sense, relay, and collect data, which are highly vulnerable to Distributed-Denial-of-Services (DDOS) attacks on network throughput. In this paper, we propose a trust-based method to optimize the network throughput of IoTs under DDOS attacks. Specifically, with the assistance of a small number of dedicatedly deployed defense nodes as defenders, a network controller can first measure the behavior of other IoT nodes and categorize them into three types (i.e., innocent, selfish, and attack) through a well-designed trust evaluation model. Then, a Stackelberg game model is constructed accordingly, where defenders are leaders and other nodes are followers. We carefully define the utilities of the leaders and the followers in the game, and transform the optimization problem of the network throughput into the maximization problem of the defenders' utilities considering the utilities of the followers. We adopt the Dinkelbach Programming (DP)-based algorithm to solve the maximization problem such that a Stackelberg equilibrium can be reached with optimized network throughput. Extensive simulations are performed to demonstrate that the proposed defense method can significantly increase the IoT network throughput under different DDOS attack intensities.
引用
收藏
页码:6259 / 6264
页数:6
相关论文
共 50 条
  • [31] Stackelberg production-protection games: Defending crop production against intentional attacks
    Musegaas, Marieke
    Schlicher, Loe
    Blok, Herman
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2022, 297 (01) : 102 - 119
  • [32] IoT standard platform architecture that provides defense against DDoS attacks
    Lee, Yun-kyung
    Kim, Young-ho
    Kim, Jeong-nyeo
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-ASIA (ICCE-ASIA), 2021,
  • [33] Defending against Contagious Attacks on a Network with Resource Reallocation
    Bai, Rufan
    Lin, Haoxing
    Yang, Xinyu
    Wu, Xiaowei
    Li, Minming
    Jia, Weijia
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 5135 - 5142
  • [34] FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks
    Jia, Yizhen
    Zhong, Fangtian
    Alrawais, Arwa
    Gong, Bei
    Cheng, Xiuzhen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10): : 9552 - 9562
  • [35] Defending Against SDN Network Topology Poisoning Attacks
    Zheng Z.
    Xu M.
    Li Q.
    Zhang Y.
    Li, Qi (qi.li@sz.tsinghua.edu.cn), 2018, Science Press (55): : 207 - 215
  • [36] A Deep Learning Game Theoretic Model for Defending Against Large Scale Smart Grid Attacks
    Cunningham, James D.
    Aved, Alexander
    Ferris, David
    Morrone, Philip
    Tucker, Conrad S.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) : 1188 - 1197
  • [37] A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
    Iyengar, N. Ch. Sriman Narayana
    Ganapathy, Gopinath
    Kumar, P. C. Mogan
    Abraham, Ajith
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (04) : 236 - 248
  • [38] Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach
    Kim, Tae Hwan
    Kim, Dong Seong
    Jung, Hee Young
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (07) : 1511 - 1522
  • [39] Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents
    Kang, Min Suk
    Gligor, Virgil D.
    Sekar, Vyas
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 47 - 57
  • [40] Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting
    Jing, Yinan
    Wang, Xueping
    Xiao, Xiaochun
    Zhang, Gendu
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,