A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services

被引:0
|
作者
Al Islam, Maher [1 ]
Fung, Carol J. [2 ]
Tantawy, Ashraf [3 ]
Abdelwahed, Sherif [1 ]
机构
[1] Virginia Commonwealth Univ, Elect & Comp Engn, Richmond, VA 23284 USA
[2] Virginia Commonwealth Univ, Comp Sci, Richmond, VA USA
[3] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
关键词
D O I
10.1109/NOMS54207.2022.9789870
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As DDoS (Distributed Denial of Service) attacks constantly evolve and bombard businesses and organizations from time to time, DDoS mitigation cloud service is a popular solution to defend against DDoS attacks. Decision makers can select which services to deploy given the associated risk and the deployment cost. In this work, we establish a game-theoretic model to simulate the decision making of attackers and defenders under the context of DDoS attacks. We simulate the attacker/defender game under different scenarios and demonstrate that the efficacy of using external services is impacted by several factors including the resources of the organization, the potential damage and the attacker cost/reward. We find that under different scenarios, the Nash Equilibrium may vary drastically from no attack at all to definite attack. Our study can provide useful insights to decision makers and stakeholders on their DDoS defense strategy planning. To the best of our knowledge, this is the first game model to investigate the DDoS attack/defense strategy involving third-party services.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Optimal strategies for vaccination and social distancing in a game-theoretic epidemiologic model
    Choi, Wongyeong
    Shim, Eunha
    JOURNAL OF THEORETICAL BIOLOGY, 2020, 505
  • [32] Game-Theoretic Strategies for Asymmetric Networked Systems
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    Hausken, Kjell
    He, Fei
    Yau, David K. Y.
    Zhuang, Jun
    2017 20TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2017, : 1809 - 1816
  • [33] An evolutionary game-theoretic analysis of poker strategies
    Ponsen, Marc
    Tuyls, Karl
    Kaisers, Michael
    Ramon, Jan
    ENTERTAINMENT COMPUTING, 2009, 1 (01) : 39 - 45
  • [34] Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
    Johnson, Benjamin
    Laszka, Aron
    Grossklags, Jens
    Vasek, Marie
    Moore, Tyler
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 72 - 86
  • [35] Neighbor intervention: A game-theoretic model
    Mesterton-Gibbons, Mike
    Sherratt, Tom N.
    JOURNAL OF THEORETICAL BIOLOGY, 2009, 256 (02) : 263 - 275
  • [36] Game-Theoretic Model of SARS Precautions
    Aquino, Leslie J. Camacho
    Cruz, Aurienne
    Dominguez, Regina-Mae
    Lee, Brian
    Oh, Hyunju
    Rychtar, Jan
    Taylor, Dewey
    KYUNGPOOK MATHEMATICAL JOURNAL, 2024, 64 (03): : 371 - 393
  • [37] A game-theoretic model of the war in Chechnya
    Kern, L
    GAME THEORY, EXPERIENCE, RATIONALITY: FOUNDATIONS OF SOCIAL SCIENCES, ECONOMICS AND ETHICS, 1998, 5 : 337 - 347
  • [38] AN EVOLUTIONARY GAME-THEORETIC MODEL OF CANNIBALISM
    Cushing, J. M.
    Henson, Shandelle M.
    Hayward, James L.
    NATURAL RESOURCE MODELING, 2015, 28 (04) : 497 - 521
  • [39] A game-theoretic model of sexual harassment
    Batabyal, Amitrajeet A.
    Beladi, Hamid
    ECONOMICS BULLETIN, 2020, 40 (02): : 1281 - 1291
  • [40] A Game-Theoretic Model of Metaphorical Bargaining
    Klebanov, Beata Beigman
    Beigman, Eyal
    ACL 2010: 48TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, 2010, : 698 - 709