Seventh International Conference on Networking (Icn 2008) 2008
DOI: 10.1109/icn.2008.121
|View full text |Cite
|
Sign up to set email alerts
|

Game-Theoretical Effectiveness Evaluation of DDoS Defense

Abstract: In the Distributed Denial of Service (DDoS) defense research, rate-limiting methods have been proposed to alleviate the damage of attacks according to different congestion control mechanisms. This paper presents a new game-theoretical methodology to evaluate effectiveness of typical DDoS defense mechanisms quantitatively. A complete strategic game model is constituted for DDoS attack and defense warfare. Besides simulation studies, mixed strategic Nash Equilibrium is computed to analysis and predict DDoS warfa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…10. In the search for new platforms for developing quick and accurate defense mechanisms, multiple new environments are being surveyed, like incentive-based defense mechanism centered on QoS and budget constraints (Dahiya & Gupta, 2019;Dahiya & Gupta, 2021a;Dahiya & Gupta, 2021b), game-theory (He et al, 2021;Michalas et al, 2011;Poisel et al, 2013;Selvi & Shebin, 2016;Shi & Lian, 2008;Sung & Hsiao, 2019;Wu et al, 2020) and deep learning (Doriguzzi-Corin et al, 2020;Hussain et al, 2020;Li et al, 2018;Roopak et al, 2019;Yuan et al, 2017).…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…10. In the search for new platforms for developing quick and accurate defense mechanisms, multiple new environments are being surveyed, like incentive-based defense mechanism centered on QoS and budget constraints (Dahiya & Gupta, 2019;Dahiya & Gupta, 2021a;Dahiya & Gupta, 2021b), game-theory (He et al, 2021;Michalas et al, 2011;Poisel et al, 2013;Selvi & Shebin, 2016;Shi & Lian, 2008;Sung & Hsiao, 2019;Wu et al, 2020) and deep learning (Doriguzzi-Corin et al, 2020;Hussain et al, 2020;Li et al, 2018;Roopak et al, 2019;Yuan et al, 2017).…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…Based on the assumption that there are only three-level attack rates (i.e., high, medium, and low), a number of optimal constant-rate DDoS attack strategies have been presented [29]- [32]. On the other hand, the effect of continuous attack rates on the attack benefit has been studied through game-theoretic approach [33]- [38].…”
Section: B Ddos Attack Strategymentioning
confidence: 99%
“…The CBR traffic generator is widely used to imitate a flooding attack, which is also applied in [22,23].The other nodes in the network generate packets with the size randomly distributing from 2 to 16 flits. DoS-4Corner: This scenario is similar to the DoS4Center scenario.…”
Section: A Experiments Setupmentioning
confidence: 99%