Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach

نویسندگان

چکیده

With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming extremely challenging to design a fully protected network. For instance, Stealthy Link Flooding Attack (SLFA) variant DDoS attacks that strives block access target area by flooding small set links, and shown can bypass traditional defense mechanisms. One potential solution tackle such SLFAs apply Moving Target Defense (MTD) techniques in which network settings are dynamically changed confuse/deceive attackers, thus making highly expensive launch successful attack. However, since MTD comes with some overhead network, find best strategy (i.e., when and/or what extent) applying has been major challenge. The significantly influenced attacker's behavior often difficult guess. In this work, we address challenge obtaining optimal effectively mitigates while incurs minimal overhead. We problem as signaling game considering defender attacker players. A belief function established throughout engagement during SLFA campaign, utilized pick response/action for each player. analyze model derive mechanism based on equilibria game. evaluate technique Mininet-based environment where an performing applies results show our game-based dynamic provide similar level protection against like extensive solution, however, causing reduced

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defense against SYN Flooding Attacks: A Scheduling Approach

The TCP connection management protocol sets a position for a classic Denial of Service (DoS) attack, called the SYN flooding attack. In this attack attacker sends a large number of TCP SYN segments, without completing the third handshaking step to quickly exhaust connection resources of the victim server. Therefore it keeps TCP from handling legitimate requests. This paper proposes that SYN flo...

متن کامل

Self-managing defense against SYN-flooding attacks

SYN-flooding attack uses the weakness available in TCP’s three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases PSA (probability of success of attack) and decreases BUE (buffer utilization efficiency) in the victim host and results to decreased performance...

متن کامل

DiCoDefense: Distributed Collaborative Defense against DDoS Flooding attacks

Detecting Distributed Denial of Service (DDoS) flooding attacks as soon as possible before they affect the victims, identifying the sources of the attacks, and finally stopping them by blocking or rate limiting the attack traffic is the ultimate goal of current defense mechanisms. The success in detecting and responding to DDoS flooding attacks is highly dependent on the data monitored by the e...

متن کامل

Stealthy Deception Attacks Against SCADA Systems

SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta–data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the abo...

متن کامل

An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently

Distributed denial of service (DDoS) attacks seriously threaten Internet services yet there is currently no defence against such attacks that provides both early detection, allowing time for counteraction, and an accurate response. Traditional detection methods rely on passively sniffing an attacking signature and are inaccurate in the early stages of an attack. Current counteractions such as t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Network Science and Engineering

سال: 2021

ISSN: ['2334-329X', '2327-4697']

DOI: https://doi.org/10.1109/tnse.2021.3052090