A game theoretic defence framework against DoS/DDoS cyber attacks

被引:51
作者
Spyridopoulos, T. [1 ]
Karanikas, G. [1 ]
Tryfonas, T. [1 ]
Oikonomou, G. [1 ]
机构
[1] Univ Bristol, Fac Engn, Cryptog Grp, Clifton BS8 1UB, England
关键词
DoS; DDoS; Game theory; Network security; Defence mechanism; Firewall; PROTECTION;
D O I
10.1016/j.cose.2013.03.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game-theoretic approaches have been previously employed in the research area of network security in order to explore the interaction between an attacker and a defender during a Distributed Denial of Service (DDoS) attack scenario. Existing literature investigates payoffs and optimal strategies for both parties, in order to provide the defender with an optimal defence strategy. In this paper, we model a DDoS attack as a one-shot, non-cooperative, zero-sum game. We extend previous work by incorporating in our model a richer set of options available to the attacker compared to what has been previously achieved. We investigate multiple permutations in terms of the cost to perform an attack, the number of attacking nodes, malicious traffic probability distributions and their parameters. We analytically demonstrate that there exists a single optimal strategy available to the defender. By adopting it, the defender sets an upper boundary to attacker payoff, which can only be achieved if the attacker is a rational player. For all other attack strategies (those adopted by irrational attackers), attacker payoff will be lower than this boundary. We preliminary validate this model via simulations with the ns2 network simulator. The simulated environment replicates the analytical model's parameters and the results confirm our model's accuracy. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:39 / 50
页数:12
相关论文
共 22 条
[1]  
Abliz M.E. H. M. U. D., 2011, Internet denial of service attacks and defense mechanisms
[2]  
[Anonymous], 2009, Survey of Network Traffic Models
[3]  
Bedi H, 2011 IEEE S COMP INT, P129
[4]  
Dingankar C, P 3 ANN CYB SEC INF, P7
[5]   A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory [J].
Fallah, Mehran S. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (01) :5-19
[6]   Internet research needs better models [J].
Floyd, S ;
Kohler, E .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (01) :29-34
[7]  
Gill S., 2009, MAXIMISING FIREWALL
[8]  
Greenberg S., 2006, PROC ACEEE SUMMER ST, P76
[9]   Formal analysis for robust anti-SPIT protection using model checking [J].
Gritzalis, Dimitris ;
Katsaros, Panagiotis ;
Basagiannis, Stylianos ;
Soupionis, Yannis .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (02) :121-135
[10]  
Hassan H, 2005, GENERIC MODELLING MU