A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services

被引:0
|
作者
Al Islam, Maher [1 ]
Fung, Carol J. [2 ]
Tantawy, Ashraf [3 ]
Abdelwahed, Sherif [1 ]
机构
[1] Virginia Commonwealth Univ, Elect & Comp Engn, Richmond, VA 23284 USA
[2] Virginia Commonwealth Univ, Comp Sci, Richmond, VA USA
[3] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
关键词
D O I
10.1109/NOMS54207.2022.9789870
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As DDoS (Distributed Denial of Service) attacks constantly evolve and bombard businesses and organizations from time to time, DDoS mitigation cloud service is a popular solution to defend against DDoS attacks. Decision makers can select which services to deploy given the associated risk and the deployment cost. In this work, we establish a game-theoretic model to simulate the decision making of attackers and defenders under the context of DDoS attacks. We simulate the attacker/defender game under different scenarios and demonstrate that the efficacy of using external services is impacted by several factors including the resources of the organization, the potential damage and the attacker cost/reward. We find that under different scenarios, the Nash Equilibrium may vary drastically from no attack at all to definite attack. Our study can provide useful insights to decision makers and stakeholders on their DDoS defense strategy planning. To the best of our knowledge, this is the first game model to investigate the DDoS attack/defense strategy involving third-party services.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Formulating Game Strategies in Game-Theoretic Rough Sets
    Azam, Nouman
    Yao, JingTao
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY: 8TH INTERNATIONAL CONFERENCE, 2013, 8171 : 145 - 153
  • [22] A Game-Theoretic Approach to Resource Allocation in the Cloud
    Salman, Ola
    Awad, Mariette
    Saab, Farah
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2016, : 132 - 137
  • [23] Noncooperative game-theoretic model for security enhancement in cloud gaming environments
    Evangeline, S. Jebarani
    Yadav, Ajit Kumar Singh
    Balaji, V. R.
    Sivaganesan, D.
    Kumar, A. Senthil
    Sivaraju, S. S.
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2024,
  • [24] NCGTM: A Noncooperative Game-Theoretic Model to Assist IDS in Cloud Environment
    Gill, Komal Singh
    Saxena, Sharad
    Sharma, Anju
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 3124 - 3132
  • [25] A differential game-theoretic model of auditing for data storage in cloud computing
    Li Z.
    Liu Y.
    Liu, Yanzhu (lizhi870218@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (14): : 341 - 348
  • [26] Pricing differentiated services: A game-theoretic approach
    Altman, E
    Barman, D
    El Azouzi, R
    Ros, D
    Tuffin, B
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 430 - 441
  • [27] Pricing differentiated services: A game-theoretic approach
    Altman, E
    Barman, D
    El Azouzi, R
    Ros, D
    Tuffin, B
    COMPUTER NETWORKS, 2006, 50 (07) : 982 - 1002
  • [28] Game-theoretic Analysis of Advance Reservation Services
    Simhon, Eran
    Starobinski, David
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [29] Multirobot Charging Strategies: A Game-Theoretic Approach
    Gao, Tianshuang
    Bhattacharya, Sourabh
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2019, 4 (03) : 2823 - 2830
  • [30] Determining Strategies in Game-Theoretic Shadowed Sets
    Zhang, Yan
    Yao, JingTao
    INFORMATION PROCESSING AND MANAGEMENT OF UNCERTAINTY IN KNOWLEDGE-BASED SYSTEMS: THEORY AND FOUNDATIONS, PT II, 2018, 854 : 736 - 747