A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory

被引:42
|
作者
Fallah, Mehran S. [1 ]
机构
[1] Amirkabir Univ Technol, Dept Comp Engn, Tehran 15914, Iran
关键词
Client-puzzle approach; flooding DoS attack; game theory; reliability; availability; serviceability;
D O I
10.1109/TDSC.2008.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, a number of puzzle-based defense mechanisms have been proposed against flooding denial-of-service (DoS) attacks in networks. Nonetheless, these mechanisms have not been designed through formal approaches and thereby some important design issues such as effectiveness and optimality have remained unresolved. This paper utilizes game theory to propose a series of optimal puzzle-based strategies for handling increasingly sophisticated flooding attack scenarios. In doing so, the solution concept of Nash equilibrium is used in a prescriptive way, where the defender takes his part in the solution as an optimum defense against rational attackers. This study culminates in a strategy for handling distributed attacks from an unknown number of sources.
引用
收藏
页码:5 / 19
页数:15
相关论文
共 50 条
  • [1] Is Puzzle-Based CAPTCHA Secure Against Attacks Based on CNN?
    Terada, Kenta
    Okabe, Yasuo
    Matsumoto, Yoshinori
    2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 358 - 362
  • [2] PERSIA: a PuzzlE-based InteReSt FloodIng Attack Countermeasure
    Tourani, Reza
    Torres, George
    Misra, Satyajayant
    PROCEEDINGS OF THE 7TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN '20), 2020, : 117 - 128
  • [3] Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach
    Aydeger, Abdullah
    Manshaei, Mohammad Hossein
    Rahman, Mohammad Ashiqur
    Akkaya, Kemal
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 751 - 764
  • [4] A Defense Strategy for UAV Swarm Against GNSS Spoofing Attacks Based on Game Model
    Gu, Zhaojun
    Zhao, Huan
    Wang, Jialiang
    Tan, Rui
    Nie, Liuyang
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT I, ICIC 2024, 2024, 14862 : 383 - 395
  • [5] TDFA: Traceback-based Defense against DDoS Flooding Attacks
    Foroushani, Vahid Aghaei
    Zincir-Heywood, A. Nur
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 597 - 604
  • [6] Defending DoS Attacks Using a Puzzle-Based Approach and Reduction in Traceback Time towards the Attacker
    Abraham, Anup Mathew
    Vincent, Shweta
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 425 - +
  • [7] Exploring the Effects of Physical Embodiment in a Puzzle-Based Educational Programming Game
    Melcer, Edward F.
    PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON CREATIVITY AND COGNITION (C&C 2017), 2017, : 532 - 538
  • [8] LOT: A Defense Against IP Spoofing and Flooding Attacks
    Gilad, Yossi
    Herzberg, Amir
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (02)
  • [9] Centralized defense using smart routing against link-flooding Attacks
    Belabed, Dallal
    Bouet, Mathieu
    Conan, Vania
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [10] Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem
    Zarei, Seyed Meysam
    Fotohi, Reza
    SECURITY AND PRIVACY, 2021, 4 (03)