A PBNM and economic incentive-based defensive mechanism against DDoS attacks

被引:11
作者
Dahiya, Amrita [1 ]
Gupta, B. B. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
DDoS attack; economic incentives; PBNM; QoS; risk transfer;
D O I
10.1080/17517575.2019.1700553
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a policy-based network management (PBNM) strategy has been proposed to defend DDoS attack along with maintaining Quality of Service (QoS) for legitimate users. During cautious or alert level users having a contract are only allowed to enter into the network. Moreover, PBNM has been used for enabling users to negotiate with the service provider dynamically on cost and types of services. Extensive experimentations have been carried out to check the validity of the proposed model. Experimentation has been performed in two phases. In first phase reachability condition will be checked on PN2 simulator and SPIN while in second phase, NS-2 is used to monitor the performance of the proposed model according to networking parameters. Results from implementation show the supremacy of the proposed model.
引用
收藏
页码:406 / 426
页数:21
相关论文
共 20 条
[1]   Security policy decision for automation of security network configuration [J].
Ahn, G ;
Yoon, SY ;
Kim, KY ;
Jang, JS .
APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, :1057-1061
[2]   Preventing Internet denial-of-service with capabilities [J].
Anderson, T ;
Roscoe, T ;
Wetherall, D .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (01) :39-44
[3]  
Bhatia S., 2018, Versatile Cybersecurity, P55
[4]   Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator [J].
Chang, Kuo-Chung ;
Seow, Yoke May .
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2019, 31 (01) :1-21
[5]  
CHEN R, 2006, GLOB TELECOMM CONF
[6]   Defending wireless infrastructure against the challenge of DDoS attacks [J].
Geng, XJ ;
Huang, Y ;
Whinston, AB .
MOBILE NETWORKS & APPLICATIONS, 2002, 7 (03) :213-223
[7]   The economics of network management [J].
Gupta, A ;
Stahl, DO ;
Whinston, AB .
COMMUNICATIONS OF THE ACM, 1999, 42 (09) :57-63
[8]  
Hiraishi K, 2001, IEICE T FUND ELECTR, VE84A, P2829
[9]  
Holzmann G., 2000, STTT, V2, P321
[10]   Defeating DDoS attacks by fixing the incentive chain [J].
Huang, Yun ;
Geng, Xianjun ;
Whinston, Andrew B. .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (01)