skip to main content
10.1145/1878537.1878703acmotherconferencesArticle/Chapter ViewAbstractPublication PagesspringsimConference Proceedingsconference-collections
research-article

On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks

Published:11 April 2010Publication History

ABSTRACT

As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has become increasingly important and challenging to both academic researchers and industry practitioners. We explore the applicability of game theoretic approaches to the cyber security problem with focus on active bandwidth depletion attacks. We model the interaction between the attacker and the defender as a two-player non-zero-sum game in two attack scenarios: (i) one single attacking node for Denial of Service (DoS) and (ii) multiple attacking nodes for Distributed DoS (DDoS). The defender's challenge is to determine optimal firewall settings to block rogue traffics while allowing legitimate ones. Our analysis considers the worst-case scenario where the attacker also attempts to find the most effective sending rate or botnet size. In either case, we build both static and dynamic game models to compute the Nash equilibrium that represents the best strategy of the defender. We validate the effectiveness of our game theoretic defense mechanisms via extensive simulation-based experiments using NS-3.

References

  1. D. G. Andersen. Mayday: Distributed filtering for internet services. In Proc. of the 4th Usenix Symposium on Internet Technologies and Systems, March 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Carneiro, P. Fortuna, and M. Ricardo. Flowmonitor-a network monitoring framework for the network simulator 3 (ns-3). In NSTOOLS, Pisa, Italy, Oct. 19 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Chertov, S. Fahmy, and N. Shroff. Emulation versus simulation: A case study of TCP-targeted denial of service attacks. In Proc. of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, page 10, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  4. Security Focus. http://www.securityfocus.com/archive/1. Security Focus Bugtraq Vulnerability Notification Database, 2009.Google ScholarGoogle Scholar
  5. B. Gourley. Cloud computing and cyber defense. Crucial Point LLC, March 2009.Google ScholarGoogle Scholar
  6. F. Lau, S. Rubin, M. Smith, and L. Trajkovic. Distributed denial of service attacks. In IEEE International Conference on Systems, Man, and Cybernetics, volume 3, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Liljenstam, J. Liu, D. Nicol, Y. Yuan, G. Yan, and C. Grier. Rinse: the real-time immersive network simulation environment for network security exercises. In Workshop on Principles of Advanced and Distributed Simulation, pages 119--128, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Mirkovic. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2):39--53, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Nicol, W. Sanders, and K. Trived. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 1(1):48--65, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu. A survey of game theory as applied to network security. To appear: The 43rd Hawaii International Conference on System Sciences, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Sarraute, F. Miranda, and J. L. Orlicki. Simulation of Computer Network Attacks. In Argentine Symposium on Computing Technology, Aug. 30 2007.Google ScholarGoogle Scholar
  12. Packet Storm. http://packetstormsecurity.org/. Packet Storm Vulnerability Database, 2009.Google ScholarGoogle Scholar
  13. US-CERT. http://www.us-cert.gov/. United States Computer Emergency Readiness Team, 2009.Google ScholarGoogle Scholar
  14. L. Wang, Q. Wu, and Y. Liu. Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks. In Proceedings of the 2009 International Conference on Computational Science and Engineering-Volume 02, pages 651--658. IEEE Computer Society, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Q. Wu, D. Ferebee, Y. Lin, and D. Dasgupta. Monitoring security events using integrated correlation-based techniques. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, page 47, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers, pages 195--208, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Yaar, A. Perrig, and D. Song. Siff: A stateless internet flow filter to mitigate ddos flooding attacks. In In Proc of IEEE Symposium on Security and Privacy, pages 130--143, 2004.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SpringSim '10: Proceedings of the 2010 Spring Simulation Multiconference
    April 2010
    1726 pages
    ISBN:9781450300698

    Publisher

    Society for Computer Simulation International

    San Diego, CA, United States

    Publication History

    • Published: 11 April 2010

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader