A game theoretic defence framework against DoS/DDoS cyber attacks

被引:48
|
作者
Spyridopoulos, T. [1 ]
Karanikas, G. [1 ]
Tryfonas, T. [1 ]
Oikonomou, G. [1 ]
机构
[1] Univ Bristol, Fac Engn, Cryptog Grp, Clifton BS8 1UB, England
关键词
DoS; DDoS; Game theory; Network security; Defence mechanism; Firewall; PROTECTION;
D O I
10.1016/j.cose.2013.03.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game-theoretic approaches have been previously employed in the research area of network security in order to explore the interaction between an attacker and a defender during a Distributed Denial of Service (DDoS) attack scenario. Existing literature investigates payoffs and optimal strategies for both parties, in order to provide the defender with an optimal defence strategy. In this paper, we model a DDoS attack as a one-shot, non-cooperative, zero-sum game. We extend previous work by incorporating in our model a richer set of options available to the attacker compared to what has been previously achieved. We investigate multiple permutations in terms of the cost to perform an attack, the number of attacking nodes, malicious traffic probability distributions and their parameters. We analytically demonstrate that there exists a single optimal strategy available to the defender. By adopting it, the defender sets an upper boundary to attacker payoff, which can only be achieved if the attacker is a rational player. For all other attack strategies (those adopted by irrational attackers), attacker payoff will be lower than this boundary. We preliminary validate this model via simulations with the ns2 network simulator. The simulated environment replicates the analytical model's parameters and the results confirm our model's accuracy. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:39 / 50
页数:12
相关论文
共 50 条
  • [1] New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost
    Zheng, Rongxin
    Ying, Cuiwen
    Shao, Jun
    Wei, Guiyi
    Yan, Hongyang
    Kong, Jianmin
    Ren, Yekun
    Zhang, Hang
    Hou, Weiguang
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 567 - 580
  • [2] METHODOLOGIES FOR EVALUATING GAME THEORETIC DEFENSE AGAINST DDOS ATTACKS
    Khirwadkar, Tanmay
    Nguyen, Kien C.
    Nicol, David M.
    Basar, Tamer
    [J]. PROCEEDINGS OF THE 2010 WINTER SIMULATION CONFERENCE, 2010, : 697 - 707
  • [3] Cooperative defence against DDoS attacks
    Zhang, GS
    Parashar, M
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2006, 38 (01): : 69 - 84
  • [4] Game Theoretic Defense Framework Against Sybil Attacks
    Bhupender Kumar
    Bubu Bhuyan
    [J]. SN Computer Science, 5 (7)
  • [5] Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
    Johnson, Benjamin
    Laszka, Aron
    Grossklags, Jens
    Vasek, Marie
    Moore, Tyler
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 72 - 86
  • [6] Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis
    Wright, Mason
    Venkatesan, Sridhar
    Albanese, Massimiliano
    Wellman, Michael P.
    [J]. MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, : 93 - 104
  • [7] BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
    Guirguis, Mina
    Tahsini, Alireza
    Siddique, Khan
    Novoa, Clara
    Moore, Justin
    Julien, Christine
    Dunstatter, Noah
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [8] Optimal Specifications for a Protective Framework Against HTTP-based DoS and DDoS Attacks
    Saleh, Mohammed A.
    Manaf, Azizah Abdul
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 263 - 267
  • [9] Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
    Rao, Nageswara S. V.
    Poole, Stephen W.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    [J]. RISK ANALYSIS, 2016, 36 (04) : 694 - 710
  • [10] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115