2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) 2013
DOI: 10.1109/aina.2013.66
|View full text |Cite
|
Sign up to set email alerts
|

Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…10. In the search for new platforms for developing quick and accurate defense mechanisms, multiple new environments are being surveyed, like incentive-based defense mechanism centered on QoS and budget constraints (Dahiya & Gupta, 2019;Dahiya & Gupta, 2021a;Dahiya & Gupta, 2021b), game-theory (He et al, 2021;Michalas et al, 2011;Poisel et al, 2013;Selvi & Shebin, 2016;Shi & Lian, 2008;Sung & Hsiao, 2019;Wu et al, 2020) and deep learning (Doriguzzi-Corin et al, 2020;Hussain et al, 2020;Li et al, 2018;Roopak et al, 2019;Yuan et al, 2017).…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…10. In the search for new platforms for developing quick and accurate defense mechanisms, multiple new environments are being surveyed, like incentive-based defense mechanism centered on QoS and budget constraints (Dahiya & Gupta, 2019;Dahiya & Gupta, 2021a;Dahiya & Gupta, 2021b), game-theory (He et al, 2021;Michalas et al, 2011;Poisel et al, 2013;Selvi & Shebin, 2016;Shi & Lian, 2008;Sung & Hsiao, 2019;Wu et al, 2020) and deep learning (Doriguzzi-Corin et al, 2020;Hussain et al, 2020;Li et al, 2018;Roopak et al, 2019;Yuan et al, 2017).…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…Parallel analysis is therefore allowed and computational cost reduces. In [10], anticipation game theory is incorporated with ABM to simulate the impacts of Distributed Denial of Service (DDoS) attacks on CIs in the form of cyber interdependencies. In the model, the major players, defenders and attackers, are represented as agents in the game and they interact based on the rules derived from DDoS graph.…”
Section: A Agent Based Modellingmentioning
confidence: 99%
“…Recent history shows that it is very difficult to authenticate whether an event comprises normal traffic or malicious attempt/attack [4]. In addition, DoS attacks have one special characteristic which distinguishes them from other network attacks [5]: in order to attack there is no need for the intruder to penetrate and exploit the target network.…”
Section: Introductionmentioning
confidence: 99%