Using game theory to configure P2P SIP

被引:0
作者
Becker, Sheila [1 ,2 ]
State, Radu [1 ,2 ]
Engel, Thomas [2 ]
机构
[1] LORIA - INRIA Lorraine, 54602 Villers-les-Nancy, 615, rue du jardin botanique
[2] University of Luxembourg, L-1359 Luxembourg, 6, r.R. Coudenhove-Kalergi
来源
IPTComm 2009: Services and Security for Next Generation Networks - Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications | 2009年
关键词
Game theory;
D O I
10.1145/1595637.1595645
中图分类号
学科分类号
摘要
In this paper we propose a framework for the analysis of the security in peer-to-peer Session Initiation Protocol based infrastructures. The proposed approach defines a game theoretical model for both an attacker as well as the defender and uses the Nash equilibrium to derive optimal attack and defensive strategies for both entities. We address the specific threats related to SPam over Internet Telephony, flooding and non-cooperative behavior and assess defensive mechanisms based on thresholds and redundant retransmissions. The paper summarizes the main results based on extensive Monte-Carlo simulations of this game. Copyright 2009 ACM.
引用
收藏
相关论文
共 26 条
  • [1] Ahmed M.S., Al-Shaer E., Khan L., A novel approach quantitative approach for measuring network security, Proceedings of IEEE Infocomm 2008, (2008)
  • [2] Ahmed M.S., Al-Shaer E., Taibah M., Abedin M., Khan L., Towards autonomic risk-aware security configuration, Proceedings of IEEE Network Operation and Management Symposium NOMS 2008, (2008)
  • [3] Arce I., Levy E., An analysis of the slapper worm, Proceedings of IEEE Security & Privacy, (2003)
  • [4] Becker S., State R., Engel T., Defensive configuration with game theory, Accepted to IEEE/IFIP IM 2009, (2008)
  • [5] Bistarelli S., Aglio M.D., Paretti P., Strategic games on defense trees, Proceedings of FAST 2007, pp. 1-15, (2007)
  • [6] Douceur J.R., Donath J.S., The Sybil Attack, pp. 251-260, (2002)
  • [7] Rosenberg J., Et al., Rfc3261, Sip: Session Initiation Protocol, (2002)
  • [8] Fessi A., Niedermayer H., Kinkelin H., Carle G., A cooperative SIP infrastructure for highly reliable telecommunication services, IPTComm '07: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications, pp. 29-38, (2007)
  • [9] Fiedler J., Kupka T., Ehlert S., Magedanz T., Sisalem D., Voip defender: Highly scalable sip-based security architecture, IPTComm '07: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications, pp. 11-17, (2007)
  • [10] Greenwald A., Matrix Games and Nash Equilibrium, (2007)