Optimal Personalized DDoS Attacks Detection Strategy in Network Systems
The wide application use of network systems extends people’s ability to access information, but its inherent network characteristics make it more vulnerable to DDoS attacks. Existing intrusion detection in network systems is usually only targeted at specific attacks, but will fail when dealing with strategic attacks. Therefore, based on game theory, the attack and defense process in the network system is analyzed, and the personalized DDoS attack detection is proposed. Considering that the attacker will observe the defender’s strategy before launching attacks, we model this problem as a Stackelberg security game and derive the optimal defensive strategy for the network system. After comparing the strategy with other non-strategic strategies, it is proved that our proposed method is more effective for detecting DDoS attack in network systems.
KeywordsDDoS attack Network systems Stackelberg game Attack detection
This work is supported by the National Natural Science Foundation of China (Grant No. 61802097), and the Project of Qianjiang Talent (Grant No. QJD1802020).
- 3.Chen, Y., Zhang, Y., Maharjan, S., Alam, M., Wu, T.: Deep learning for secure mobile edge computing in cyber-physical transportation systems. IEEE Network (2019)Google Scholar
- 8.Kiekintveld, C., Islam, T., Kreinovich, V.: Security games with interval uncertainty. In: International Conference on Autonomous Agents and Multi-Agent Systems, pp. 231–238 (2013)Google Scholar
- 9.Laszka, A., Abbas, W., Sastry, S.S., Vorobeychik, Y., Koutsoukos, X.: Optimal thresholds for intrusion detection systems. In: Symposium and Bootcamp on the Science of Security, pp. 72–81 (2016)Google Scholar
- 13.Mall, P., Bhuiyan, M.Z.A., Amin, R.: A lightweight secure communication protocol for IoT devices using physically unclonable function. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 26–35. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_3CrossRefGoogle Scholar
- 14.Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: a statistical anomaly approach. IEEE Press (2002)Google Scholar
- 16.Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: Hawaii International Conference on System Sciences, pp. 1–10 (2010)Google Scholar
- 17.Sarker, J.H., Nahhas, A.M.: Mobile RFID system in the presence of denial-of-service attacking signals. IEEE Trans. Autom. Sci. Eng. PP(99), 1–13 (2016)Google Scholar
- 18.Shieh, E., An, B.: Protect: an application of computational game theory for the security of the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012), pp. 13–20 (2012)Google Scholar
- 24.Zonouz, S.A., Khurana, H., Sanders, W.H., Yardley, T.M.: RRE: a game-theoretic intrusion response and recovery engine. In: IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 439–448 (2009)Google Scholar