A game theoretic defending model with puzzle controller for distributed dos attack prevention

被引:1
|
作者
Lv, Jun-Jie [1 ]
机构
[1] Beijing Technol & Business Univ, Sch Business, Beijing 100037, Peoples R China
关键词
DDoS attack; game theory; mechanism design; client puzzle; auction;
D O I
10.1109/ICMLC.2008.4620562
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial-of-service is hard to prevent because the attackers could use the authentic IP addresses of the zombies to hide the source of attacks and to increase the computational ability. In this paper, a game theoretic defending model with puzzle controller against this kind of attack is proposed. T e malicious attackers can be distinguished from legitimate clients by consuming their computational ability dramatically, with the puzzle controller. The proper puzzle difficulty to filter out attackers is also deduced to give an instruction for clients and servers. Meanwhile, the relationships between certain variables are further investigated.
引用
收藏
页码:1064 / 1069
页数:6
相关论文
共 38 条
  • [1] Defending DDoS Attack using Stochastic Model based Puzzle Controller
    Santhosh, K. M.
    Isaac, Elizabeth
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (04): : 100 - 105
  • [2] Preventing DoS attack in sensor networks: A game theoretic approach
    Agah, A
    Basu, K
    Das, SK
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3218 - 3222
  • [3] A knowledge-based model for defending distributed DoS
    Lin, SS
    Lin, SC
    Tseng, SS
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 257 - 263
  • [4] Using game theory to model DoS attack and defence
    Bhupender Kumar
    Bubu Bhuyan
    Sādhanā, 2019, 44
  • [5] Using game theory to model DoS attack and defence
    Kumar, Bhupender
    Bhuyan, Bubu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (12):
  • [6] A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 93 - 112
  • [7] A Game-Theoretic Model for Defending Against Malicious Users in RecDroid
    Rashidi, Bahman
    Fung, Carol
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1339 - 1344
  • [8] Design of Rollover Prevention Controller Using Game-Theoretic Approach
    Yim, Seongjin
    TRANSACTIONS OF THE KOREAN SOCIETY OF MECHANICAL ENGINEERS A, 2013, 37 (11) : 1429 - 1436
  • [9] SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
    Li, Yuzhe
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (03): : 632 - 642
  • [10] A Game Model of APT Attack for Distributed Network
    Zhang Wei
    Su Yang
    Chen Wenwu
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC-2017), 2018, 13 : 224 - 234