2020
DOI: 10.1016/j.cose.2020.101976
|View full text |Cite
|
Sign up to set email alerts
|

Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…The theory for the proposed mechanism was mostly propounded based on author [24] whom had no major weakness and considered a cost effective shuffling that accommodates overhead, but it did not consider SDN IoT-Edge Architectures or DDoS focuses on exploitation of IoT devices whom which this study expanded a light on. Author [25] research also focused on defence for IoT and considers Edge Computing level servers but the moving rate for the changing configurations is not specified and the computation of shuffling unpredictability for the system is not carried out which the proposed system has made a clear configurable function for event generation.…”
Section: A Critical Analysismentioning
confidence: 99%
“…The theory for the proposed mechanism was mostly propounded based on author [24] whom had no major weakness and considered a cost effective shuffling that accommodates overhead, but it did not consider SDN IoT-Edge Architectures or DDoS focuses on exploitation of IoT devices whom which this study expanded a light on. Author [25] research also focused on defence for IoT and considers Edge Computing level servers but the moving rate for the changing configurations is not specified and the computation of shuffling unpredictability for the system is not carried out which the proposed system has made a clear configurable function for event generation.…”
Section: A Critical Analysismentioning
confidence: 99%
“…Many statistical approaches such as entropy, principal components analysis, hidden Markov models, mutual information, correlation, and covariance have been used for network anomalies detection [6]. The method in [7] offered a statistical method for dealing with DDoS mitigation. Using Markov decision processes with multiple objectives, It is used to discover the best Moving Target Defense strategy by resolving the shuffling efficacy vs. cost trade-off.…”
Section: Related Workmentioning
confidence: 99%
“…I i and I ij are the criticality of node i and edge (i, j) to network, respectively. Among them, the I i is calculated as the product of node's betweenness and the sum of node's observation and action ability, and the I ij is calculated as the product of edge's betweenness and the sum of two side node's network criticality, which can be illustrated as Equation ( 8) and (9).…”
Section: B Core Capabilities Of Resiliencementioning
confidence: 99%
“…There emerges diverse network attacks and threats, and network security defenses are also being developed into a proactive defense direction, such as the Moving Target Defense [9]. Therefore, it has become an urgent problem to reasonably and effectively evaluate and improve the network resilience in various attack and defense scenarios.…”
Section: Introductionmentioning
confidence: 99%