A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory

被引:42
|
作者
Fallah, Mehran S. [1 ]
机构
[1] Amirkabir Univ Technol, Dept Comp Engn, Tehran 15914, Iran
关键词
Client-puzzle approach; flooding DoS attack; game theory; reliability; availability; serviceability;
D O I
10.1109/TDSC.2008.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, a number of puzzle-based defense mechanisms have been proposed against flooding denial-of-service (DoS) attacks in networks. Nonetheless, these mechanisms have not been designed through formal approaches and thereby some important design issues such as effectiveness and optimality have remained unresolved. This paper utilizes game theory to propose a series of optimal puzzle-based strategies for handling increasingly sophisticated flooding attack scenarios. In doing so, the solution concept of Nash equilibrium is used in a prescriptive way, where the defender takes his part in the solution as an optimum defense against rational attackers. This study culminates in a strategy for handling distributed attacks from an unknown number of sources.
引用
收藏
页码:5 / 19
页数:15
相关论文
共 50 条
  • [31] A distributed defense framework for flooding-based DDoS attacks
    You, Yonghua
    Zulkernine, Mohammad
    Haque, Anwar
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 245 - +
  • [32] The Best Defense Strategy Against Session Hijacking Using Security Game in SDN
    Lu, Zhenping
    Chen, Fucai
    Cheng, Guozhen
    Li, Shuxin
    2017 19TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS (HPCC) / 2017 15TH IEEE INTERNATIONAL CONFERENCE ON SMART CITY (SMARTCITY) / 2017 3RD IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (DSS), 2017, : 419 - 426
  • [33] QUICwand: A Machine Learning Optimization-based Hybrid Defense Approach Against QUIC Flooding Attacks
    Joarder, Y. A.
    Fung, Carol
    20TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN 2024, 2024, : 92 - 99
  • [34] Novel Defense Mechanism against Data Flooding Attacks in Ad Hoc Network
    Bahaddur, Indira
    Triveni, C. L.
    Srikanth, P. C.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [35] Joint application and network defense against DDoS flooding attacks in the future Internet
    Karrer, Roger P.
    Kuehn, Ulrich
    Huehn, Thomas
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 9 - +
  • [36] A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi
    Joshi, James
    Tipper, David
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2046 - 2069
  • [37] Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach
    Chen, Xu
    Feng, Wei
    Luo, Yantian
    Shen, Meng
    Ge, Ning
    Wang, Xianbin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01): : 117 - 128
  • [38] A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks
    Huang, Zhao
    Gao, Xin
    Liu, Xiao
    Fan, Lu
    Wang, Junjun
    Wang, Quan
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 299 - 304
  • [39] A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code
    Tsai, Chwei-Shyong
    Chen, Hsin-Liang
    Wu, Hsien-Chu
    Ying, Josh Jia-Ching
    SYMMETRY-BASEL, 2021, 13 (10):
  • [40] A game inspired defense mechanism against distributed denial of service attacks
    Bedi, Harkeerat
    Shiva, Sajjan
    Roy, Sankardas
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2389 - 2404