Research on Offense and Defense of DDos Based on Evolutionary Game Theory

被引:0
|
作者
Zhao, Tengteng [1 ]
Zhang, Wei [1 ]
Li, Xiaolong [1 ]
Wang, Wenjing [1 ]
Niu, Xu [1 ]
Guo, Hui [2 ]
机构
[1] Beijing Inst Control & Elect Technol, Muxidi North St, Beijing 100038, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Network security; DDos attacks; Game theory; Evolutionary game theory;
D O I
10.1007/978-3-031-06791-4_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
While the advancement of network technology has brought convenience to people's lives, there are also potential threats. Cyberspace security is closely related to national security. DDos attacks exploit protocol vulnerabilities and use malicious traffic from multiple sources to attack networks and network services, have caused huge economic losses to users and service providers. Based on the evolutionary game theory, this paper models both the offense and defense of DDos, and studies the offense and defense of DDos from a micro perspective. Through the elaboration of the conflict of interest between the attackers and the defenders, the evolutionary game and simulation are carried out. The model and simulation results show that the attackers are more inclined to launch attacks, and the defenders' strategy choices are related to the cost of the active defense system.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
  • [1] DDoS Defense by Offense
    Walfish, Michael
    Vutukuru, Mythili
    Balakrishnan, Hari
    Karger, David
    Shenker, Scott
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2010, 28 (01):
  • [2] DDoS defense by offense
    Walfish, Michael
    Vutukuru, Mythili
    Balakrishnan, Hari
    Karger, David
    Shenker, Scott
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 303 - 314
  • [3] Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory
    Shi, Leyi
    Wang, Xiran
    Hou, Huiwen
    MATHEMATICS, 2021, 9 (08)
  • [4] A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks
    Huang, Zhao
    Gao, Xin
    Liu, Xiao
    Fan, Lu
    Wang, Junjun
    Wang, Quan
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 299 - 304
  • [5] Taking offense at offense-defense theory
    Davis, JW
    Finel, BI
    Goddard, SE
    Van Evera, S
    Glaser, CL
    Kaufmann, C
    INTERNATIONAL SECURITY, 1998, 23 (03) : 179 - 182
  • [6] Defense Strategy Selection Model Based on Multistage Evolutionary Game Theory
    Liu Y.
    Chen H.
    Zhang H.
    Liu X.
    Security and Communication Networks, 2021, 2021
  • [7] Generation of security system defense strategies based on evolutionary game theory
    Zou, Bowen
    Wang, Yongdong
    Liu, Chunqiang
    Dai, Mingguang
    Du, Qianwen
    Zhu, Xiang
    NUCLEAR ENGINEERING AND TECHNOLOGY, 2024, 56 (09) : 3463 - 3471
  • [8] Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory
    Qiu, Yihui
    Chen, Zhide
    Xu, Li
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [9] A generic approach for network defense strategies generation based on evolutionary game theory
    Liu, Liang
    Tang, Chuhao
    Zhang, Lei
    Liao, Shan
    INFORMATION SCIENCES, 2024, 677
  • [10] Dynamic offense and defense of UAV swarm based on situation evolution game
    Sheng L.
    Shi M.
    Qi Y.
    Li H.
    Pang M.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2023, 45 (08): : 2332 - 2342