Research on Offense and Defense of DDos Based on Evolutionary Game Theory

被引:0
|
作者
Zhao, Tengteng [1 ]
Zhang, Wei [1 ]
Li, Xiaolong [1 ]
Wang, Wenjing [1 ]
Niu, Xu [1 ]
Guo, Hui [2 ]
机构
[1] Beijing Inst Control & Elect Technol, Muxidi North St, Beijing 100038, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
Network security; DDos attacks; Game theory; Evolutionary game theory;
D O I
10.1007/978-3-031-06791-4_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
While the advancement of network technology has brought convenience to people's lives, there are also potential threats. Cyberspace security is closely related to national security. DDos attacks exploit protocol vulnerabilities and use malicious traffic from multiple sources to attack networks and network services, have caused huge economic losses to users and service providers. Based on the evolutionary game theory, this paper models both the offense and defense of DDos, and studies the offense and defense of DDos from a micro perspective. Through the elaboration of the conflict of interest between the attackers and the defenders, the evolutionary game and simulation are carried out. The model and simulation results show that the attackers are more inclined to launch attacks, and the defenders' strategy choices are related to the cost of the active defense system.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
  • [31] Research on Coordination in Closed -loop Supply Chain Based on Evolutionary Game Theory
    Yin Xiangzhou
    Tian Xinwei
    Liu Yanwu
    Liu Yongjun
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON PRODUCT INNOVATION MANAGEMENT, VOLS I AND II, 2009, : 1442 - 1446
  • [32] Research of mobile payments business model in china based on the evolutionary game theory
    Fan, Zi-Fu
    Xu, Jun-Xian
    Wan, Xiao-Yu
    Information Technology Journal, 2013, 12 (20) : 5466 - 5471
  • [33] Research on the on-Exchange Implementation of Data Trading Based on Evolutionary Game Theory
    Zhang, Juntao
    Zhang, Xueying
    Zhang, Jincan
    IEEE ACCESS, 2024, 12 : 20894 - 20906
  • [34] Research on the mobility behaviour of Chinese construction workers based on evolutionary game theory
    Sun Jide
    Wang Xincheng
    Shen Liangfa
    ECONOMIC RESEARCH-EKONOMSKA ISTRAZIVANJA, 2018, 31 (01): : 1 - 14
  • [35] The Research on Medical Information Sharing Between Hospitals Based on Evolutionary Game Theory
    Zhang, Qiang
    Wang, Li-Ya
    Liu, Nian-Yan
    Pei, Dong-Hao
    Jiang, Zhi-Bin
    2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 1433 - 1438
  • [36] Study on knowledge cooperation of interdisciplinary research team based on evolutionary game theory
    Zhao, Huan
    Chen, Xi
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (05) : 8782 - 8799
  • [37] Game-Theoretical Effectiveness Evaluation of DDoS Defense
    Shi, Pan
    Lian, Yifeng
    ICN 2008: SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING, PROCEEDINGS, 2008, : 427 - 433
  • [38] Dynamic game model of botnet DDoS attack and defense
    Wang, Yichuan
    Ma, Jianfeng
    Zhang, Liumei
    Ji, Wenjiang
    Lu, Di
    Hei, Xinhong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3127 - 3140
  • [39] Mitigating DDoS with PoW and Game Theory
    Sung, Kum-Yuan
    Hsiao, Shun-Wen
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 6223 - 6225
  • [40] Swarms of robots based on evolutionary game theory
    Givigi, Sidney N., Jr.
    Schwartz, Howard M.
    NINTH IASTED INTERNATIONAL CONFERENCE ON CONTROL AND APPLICATIONS, 2007, : 1 - +