Skip to main content

Research on Offense and Defense of DDos Based on Evolutionary Game Theory

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13340))

Included in the following conference series:

  • 1147 Accesses

Abstract

While the advancement of network technology has brought convenience to people’s lives, there are also potential threats. Cyberspace security is closely related to national security. DDos attacks exploit protocol vulnerabilities and use malicious traffic from multiple sources to attack networks and network services, have caused huge economic losses to users and service providers. Based on the evolutionary game theory, this paper models both the offense and defense of DDos, and studies the offense and defense of DDos from a micro perspective. Through the elaboration of the conflict of interest between the attackers and the defenders, the evolutionary game and simulation are carried out. The model and simulation results show that the attackers are more inclined to launch attacks, and the defenders’ strategy choices are related to the cost of the active defense system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tu, T., Liu, X., Song, L.: Understanding real-world concurrency bugs in Go. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 865–878 (2019)

    Google Scholar 

  2. Tu, T., Rao, L., Zhang, H.: Privacy-preserving outsourced auditing scheme for dynamic data storage in cloud. Secur. Commun. Netw. (2017)

    Google Scholar 

  3. Qin, B., Tu, T., Liu, Z.: Algorithmic profiling for real-world complexity problems. IEEE Trans. Softw. Eng. (2021)

    Google Scholar 

  4. Rao, L., Zhang, H., Tu, T.: Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated Merkle hash tree. IEEE Trans. Serv. Comput. 13(3), 451–463 (2017)

    Article  Google Scholar 

  5. Zhang, H., Qin, B., Tu, T.: An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications. IEEE Trans. Industr. Inf. 16(1), 658–668 (2019)

    Article  Google Scholar 

  6. Qin, J., Zhang, H., Guo, J.: Vulnerability detection on android apps-inspired by case study on vulnerability related with web functions. IEEE Access 8, 106437–106451 (2020)

    Article  Google Scholar 

  7. Qin, J., Zhang, H., Wang, S.: Acteve++: an improved android application automatic tester based on acteve. IEEE Access 7, 31358–31363 (2019)

    Article  Google Scholar 

  8. Wang, S., Qin, S., Qin, J.: Ransomware-oriented detector for mobile devices based on behaviors. Appl. Sci. 11(14), 6557 (2021)

    Article  Google Scholar 

  9. Wang, S., Qin, S., He, N.: KRRecover: an auto-recovery tool for hijacked devices and encrypted files by ransomwares on android. Symmetry 13(5), 861 (2021)

    Article  Google Scholar 

  10. Artail, H., Safa, H., Sraj, M.: A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Comput. Secur. 25(4), 274–288 (2006)

    Article  Google Scholar 

  11. Liu, X., Tong, Z., Shi, W.: A study on the evolutionary game of data sharing among researchers in the era of big data: a trust mechanism perspective. Intell. Theory Pract. 42(3), 92 (2019)

    Google Scholar 

  12. Hewett, R., Rudrapattana, S., Kijsanayothin, P.: Cyber-security analysis of smart grid SCADA systems with game models. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, pp. 109–112 (2014)

    Google Scholar 

  13. Zhang, Y., Tan, X., Cui, X.: Network security situation awareness approach based on Markov game model. J. Softw. 22(3), 495–508 (2011)

    Article  Google Scholar 

  14. Liu, J., Liu, J., Lu, Y.: Optimal defense strategy selection method based on network attack and defense game model. Comput. Sci. 45(6), 117–123 (2018)

    Google Scholar 

  15. Jun, L., Li, T.: Cyber-physical security analysis of smart grids with bayesian sequential game models. Acta Automatica Sinica 45(1), 98–109 (2019)

    Google Scholar 

  16. Manadhata, P.K.: Game theoretic approaches to attack surface shifting. In: Moving Target Defense II, pp. 1–13. Springer, Cham (2013). https://doi.org/10.1007/978-1-4614-5416-8_1

  17. Mölsä, J.V.E.: A taxonomy of criteria for evaluating defence mechanisms against flooding DoS Attacks. In: Blyth, A. (eds.) EC2ND 2005. Springer, London (2006). https://doi.org/10.1007/1-84628-352-3_2

  18. Meadows, C.: A cost-based framework for analysis of denial of service in networks. J. Comput. Secur. 9(1–2), 143–164 (2001)

    Article  Google Scholar 

  19. Huang, L., Feng, D., Lian, Y., Chen, K., Zhang, Y., et al.: A multi-attribute decision-based selection method for DDoS protection measures. J. Softw. 26(7), 1742–1756 (2015)

    MathSciNet  Google Scholar 

  20. Shi, P., Lian, Y.: Game-theoretical effectiveness evaluation of DDoS. In: Seventh International Conference on Networking, pp. 427–433 (2008)

    Google Scholar 

  21. Shi, Y., et al.: Q-learning based DDoS attack game model study. Comput. Sci. 41(11), 203–226 (2014)

    Google Scholar 

  22. Zhang, S.: Research on the evaluation method of DDoS defense mechanism based on static game with incomplete information. J. Foshan Inst. Sci. Technol. Nat. Sci. Ed. 6, 12–16 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaolong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, T., Zhang, W., Li, X., Wang, W., Niu, X., Guo, H. (2022). Research on Offense and Defense of DDos Based on Evolutionary Game Theory. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics