A game inspired defense mechanism against distributed denial of service attacks

被引:9
作者
Bedi, Harkeerat [1 ]
Shiva, Sajjan [1 ]
Roy, Sankardas [2 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[2] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
关键词
denial of service; game theory; Nash equilibrium; DeterLab testbed; DDoS emulation;
D O I
10.1002/sec.949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games played among attackers and system defenders. The widely accepted concept of Nash equilibrium can be used to determine the optimal strategy for all players playing the game. In this work, we demonstrate the applicability of game theory in modeling the defense against distributed denial of service attacks. In particular, we focus on attack scenarios that attempt to create congestion in bottleneck network links. We design a game model to determine the best defense strategy for the defender in such attack scenarios. In our model, the attacker uses a botnet consisting of multiple nodes to send rogue traffic in order to flood one or more links in the target network. The defender's challenge is to determine the best firewall settings to block rogue traffic while allowing legitimate traffic. We validate our game model using simulation. Furthermore, we build a comprehensive defense architecture called game inspired defense architecture and test its performance via emulation on one publicly available testbed called DeterLab. Open source software, such as Bro intrusion detection system, Dummynet network emulator, IP firewall, and Iperf network testing tool are used to build game inspired defense architecture. Our proposed defense solution exhibits promising results during both simulation and emulation. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2389 / 2404
页数:16
相关论文
共 54 条
[1]  
Andersen D., 2003, 4th USENIX Symposium on Internet Technologies and Systems USITS, P37
[2]  
[Anonymous], 2011, BBC News
[3]  
[Anonymous], 1997, P ACM SIGCOMM COMP C
[4]  
[Anonymous], 2011, INFOSECURITY MAG AUG
[5]  
Argyrakis K, 2005, NETWORK CAPABILITIES
[6]  
Bedis H, 2011, GAME THEORY BASED DE, P129
[7]  
Benzels T, 2006, 2 INT C TESTB RES IN
[8]  
Carbone M, 2010, ACM SIGCOMM COMP COM, V40, P13, DOI 10.1145/1764873.1764876
[9]   A survey on game theory applications in wireless networks [J].
Charilas, Dimitris E. ;
Panagopoulos, Athanasios D. .
COMPUTER NETWORKS, 2010, 54 (18) :3421-3430
[10]   Stochastic RED and its applications [J].
Chen, Shan ;
Zhou, Zhen ;
Bensaou, Brahim .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :6362-6367