A game inspired defense mechanism against distributed denial of service attacks

被引:9
|
作者
Bedi, Harkeerat [1 ]
Shiva, Sajjan [1 ]
Roy, Sankardas [2 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[2] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
关键词
denial of service; game theory; Nash equilibrium; DeterLab testbed; DDoS emulation;
D O I
10.1002/sec.949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games played among attackers and system defenders. The widely accepted concept of Nash equilibrium can be used to determine the optimal strategy for all players playing the game. In this work, we demonstrate the applicability of game theory in modeling the defense against distributed denial of service attacks. In particular, we focus on attack scenarios that attempt to create congestion in bottleneck network links. We design a game model to determine the best defense strategy for the defender in such attack scenarios. In our model, the attacker uses a botnet consisting of multiple nodes to send rogue traffic in order to flood one or more links in the target network. The defender's challenge is to determine the best firewall settings to block rogue traffic while allowing legitimate traffic. We validate our game model using simulation. Furthermore, we build a comprehensive defense architecture called game inspired defense architecture and test its performance via emulation on one publicly available testbed called DeterLab. Open source software, such as Bro intrusion detection system, Dummynet network emulator, IP firewall, and Iperf network testing tool are used to build game inspired defense architecture. Our proposed defense solution exhibits promising results during both simulation and emulation. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2389 / 2404
页数:16
相关论文
共 50 条
  • [1] A Cooperative Mechanism to Defense Against Distributed Denial of Service Attacks
    Beitollahi, Hakem
    Deconinck, Geert
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 11 - 20
  • [2] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362
  • [3] Characterization of defense mechanisms against distributed denial of service attacks
    Chen, LC
    Longstaff, TA
    Carley, KM
    COMPUTERS & SECURITY, 2004, 23 (08) : 665 - 678
  • [4] Defense mechanisms against Distributed Denial of Service attacks : A survey
    Manavi, Mousa Taghizadeh
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 72 : 26 - 38
  • [5] Rule-based Defense mechanism against distributed denial-of-service attacks
    Kim, Sung-ju
    Kim, Byung-chul
    Lee, Jae-yong
    Hwang, Chan-kyou
    Lee, Jae-jin
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 543 - +
  • [6] A Hybrid Defense Technique for ISP Against the Distributed Denial of Service Attacks
    Moon, Young Hoon
    Choi, Suk Bong
    Kim, Huy Kang
    Yoo, Changsok
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2347 - 2359
  • [7] A THREE-LAYER DEFENSE MECHANISM BASED ON WEB SERVERS AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS
    Wu, Zhijun
    Chen, Zhifeng
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [8] Defense Analysis Against Store and Forward Distributed Reflective Denial of Service Attacks
    Fraiwan, M.
    Al-Quran, Fidaa
    Al-Duwairi, Basheer
    PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2018, : 111 - 116
  • [9] A Survey of Defense Mechanisms Against Application Layer Distributed Denial of Service Attacks
    Wang, Yadong
    Liu, Lianzhong
    Sun, Bo
    Li, Yingbo
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 1034 - 1037
  • [10] A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi
    Joshi, James
    Tipper, David
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2046 - 2069