A Model for Managing Input Stream in Computer Networks to Prevent Denial-of-Service Attack Based on Game Theory

Document Type : Original Article

Author

Faculty of Computer Engineering and Information Technology, Shahid Sattari University of Aeronautical Sciences and Technology

Abstract

In computer incidents, the benefits of the attacker’s (defender) strategy depend heavily on the performance of the defender (attacker). Thus, the effectiveness of the crisis management mechanism relies on the strategic behaviors of the defender and the attacker, and the use of an effective tool, based on information technology can lead to a significant increase in the efficiency. The DoS attacks based on bandwidth reduction are a constant threat to network security. The proposed methods, due to the lack of quantitative approaches in modeling defense strategies against these attacks, cannot solve the problem effectively. Game theory can provide a framework for modeling such attacks. A game theory-based model can act as a decision support system for the defender and enhance its ability to make the best decisions to maintain an optimal level of network security against such attacks. In this paper, a proposed model for responding to the DoS attacks, based on game theory, is presented as a game between attacker and defender. The network is also modeled and the efficiency is calculated. The results show that the game converges to the Nash equilibrium and the best action is inferred from this strategy. The results obtained by simulation and numerical calculations are in favor of the proposed theoretical defense mechanism of the game and support the merit of using game theory to defend against DoS attacks to strengthen network security.

Keywords


Smiley face

  • Agah, M. Asadi, and S. K. Das, "Prevention of DoS Attack in Sensor Networks Using Repeated Game Theory," in ICWN, 2006, pp. 29-36.##
  • Michalas, N. Komninos, and N. R. Prasad, "Cryptographic Puzzles and Game Theory Against Dos and Ddos Attacks in Networks," Int. J. of Computer Research, vol. 19, no. 1, pp. 79, 2012.##
  • -Y. Shi, W.-L. Wang, N.-M. Kwok, and S.-Y. Chen, "Game Theory for Wireless Sensor Networks: A Survey," Sensors, vol. 12, no. 7, pp. 9055-9097, 2012.##
  • Wang, Y. Wang, J. Liu, Z. Huang, and P. Xie, "A survey of Game Theoretic Methods for Cyber Security," in 2016 IEEE First Int. Conf. on Data Sci. in Cyberspace (DSC), IEEE,pp. 631-636,2016.##

  • Yazdankhah and A. R. Honarvar, "An Intelligent Security Approach Using Game Theory to Detect DoS attacks in IoT," Int. J. Adv. Comput. Sci. Appl., vol. 8, pp. 313-318, 2017.##
  • T. Do et al., "Game theory for cyber security and privacy," ACM Computing Surveys (CSUR), vol. 50, no. 2, pp. 1-37, 2017.##
  • G. Yang, "Game theory-inspired evolutionary algorithm for global optimization," Algorithms, vol. 10, no. 4, p. 111, 2017.##
  • Gao, Y. Li, L. Zhang, F. Lin, and M. Ma, "Research on detection and defense mechanisms of DoS attacks based on BP neural network and game theory," IEEE Access, vol. 7, pp. 43018-43030, 2019.##
  • A. Habib and S. Moh, "Game theory-based routing for wireless sensor networks: A comparative survey," Applied Sciences, vol. 9, no. 14, p. 2896, 2019.##
  • Liu, NC Luong, W Wang, D Niyato, P Wang., "A Survey on Applications of Game Theory in Blockchain," arXiv Preprint arXiv:1902.10865, 2019.##
  • Riahi and A. Riahi, "Game Theory for Resource Sharing in Large Distributed Systems," Int. J.l of Electrical & Computer Eng. (2088-8708), vol. 9, no. 2, pp. 78-89, 2019.##
  • Zargaryan and D. Gevorgyan, "Distributed Algorithms and Game Theory."
  • Cheng, H. Yan, X. Zhan, S. Fan, and K. Shi, "Stability Analysis of Networked Control Systems under DoS Attacks in Frequency Domain via Game Theory Strategy," Int. J. of Systems Sci.,vol. 52, no. 14, pp. 1-13, 2021.##
  • Antonakakis T April, M Bailey, M Bernhard., "Understanding the Mirai Botnet," In 26th {USENIX} security Symposium ({USENIX} Security 17), pp. 1093-1110, 2017.##
  • Gore, S. Y. Diallo, J. Padilla, and B. Ezell, "Assessing Cyber-Incidents Using Machine Learning," Int. J. of Information and Computer Security, vol. 10, no. 4, pp. 341-360, 2018.##
  • Kumar and B. Bhuyan, "Using Game Theory to Model DoS Attack and Defence," Sādhanā, vol. 44, no. 12, pp. 1-12, 2019.##