Skip to main content

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model

  • Conference paper
Information Security Practice and Experience (ISPEC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7863))

Abstract

In a typical DDoS attack and defense scenario, both the attacker and the defender will take actions to maximize their utilities. However, each player does not know his opponent’s investment and cannot adopt the optimal strategies. We formalize a Bayesian game model to handle these uncertainties and specify two problems usually faced by the defender when choosing defense measures. A nonlinear programming method is proposed to handle policies’ permutation in order to maximize the defender’s utility. Followed the Nash equilibrium, security administrators can take optimal strategies. Finally, the practicality and effectiveness of the model and method are illustrated by an example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dewri, R., Poolsappasit, N., Ray, I., Whitley, D.: Optimal Security Hardening Using Multi-objective Optimization on Attack Tree Models of Networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 204–213 (2007)

    Google Scholar 

  2. Butler, S.: Security Attribute Evaluation Method: A Cost-Benefit Approach. In: Proceedings of ICSE 2002 International Conference on Software Engineering, pp. 232–240 (2002)

    Google Scholar 

  3. Arora, K., Kumar, K., Sachdeva, M.: Impact Analysis of Recent DDoS Attacks. International Journal on Computer Science and Engineering (IJCSE) 3(2), 877–884 (2011)

    Google Scholar 

  4. Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical Approaches to DDoS Attack Detection and Response. In: Proceedings of the DARPA Information Survivability Conference and Exposition (2003)

    Google Scholar 

  5. Li, Q., Chang, E., Chan, M.: On the Effectiveness of DDoS Attacks on Statistical Filtering. In: Proceedings of INFOCOM 2005, pp. 1373–1383 (2005)

    Google Scholar 

  6. Kuznetsov, V., Sandström, H., Simkin, A.: An evaluation of Different IP Traceback Approaches. In: Deng, R., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 37–48. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communications Review 34(2), 39–54 (2004)

    Article  Google Scholar 

  8. Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defense Mechanisms: Classification and State–of–the–Art. Computer Networks 44, 643–666 (2004)

    Article  Google Scholar 

  9. Böhme, R.: Security Metrics and Security Investment Models. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 10–24. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Böhme, R., Schwartz, G.: Modeling Cyber-Insurance: Towards A Unifying Framework. In: Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge (2010)

    Google Scholar 

  11. Lelarge, M., Bolot, J.: Economic Incentives to Increase Security in the Internet: The Case for Insurance. In: IEEE INFOCOM 2009, pp. 1494–1502 (2009)

    Google Scholar 

  12. Mao, Z., Sekar, V., Spatscheck, O., et al.: Analyzing Large DDoS Attacks Using Multiple Data Sources. In: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense (LSAD), pp. 161–168 (2006)

    Google Scholar 

  13. Mirkovic, J., Arikan, E., Wei, S., Thomas, R., Fahmy, S., Reiher, P.: Benchmarks for DDoS defense evaluation. In: Military Communications Conference (2006)

    Google Scholar 

  14. Mahimkar, A., Shmatikov, V.: Game-based Analysis of Denial-of-Service Prevention Protocols. In: 18th IEEE Computer Security Foundations Workshop (CSFW), Aix-en-Provence, France, pp. 287–301. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

  15. Ramachandran, V.: Analyzing DoS-Resistance of Protocols Using a Cost-Based Framework. Technical report, DCS/TR-1239, Yale University (2002)

    Google Scholar 

  16. Li, Z., Liao, Q., Striegel, A.: Botnet Economics: Uncertainty Matters. In: Johnson, M.E. (ed.) Managing Information Risk and the Economics of Security, pp. 245–267. Springer, New York (2008)

    Google Scholar 

  17. Kantarcioglu, M., Bensoussan, A., Hoe, S(C.): Investment in Privacy-Preserving Technologies under Uncertainty. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 219–238. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  18. Böhme, R., Félegyházi, M.: Optimal Information Security Investment with Penetration Testing. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 21–37. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Elahi, G., Yu, E.: Modeling and Analysis of Security Trade-Offs - A Goal Oriented Approach. Data and Knowledge Engineering 68(7), 579–598 (2009); Special Issue: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.): ER 2007. LNCS, vol. 4801. Springer, Heidelberg (2007)

    Google Scholar 

  20. Böhme, R., Kataria, G.: Models and Measures for Correlation in Cyber-Insurance. In: Proceedings of the Fifth Annual Workshop on Economics and Information Security (WEIS 2006), Cambridge, UK (2006)

    Google Scholar 

  21. Johnson, B., Böhme, R., Grossklags, J.: Security Games with Market Insurance. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 117–130. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  22. Liu, Y., Comaniciu, C., Man, H.: A Bayesian Game Approach for Intrusion Detection in Wireless AD Hoc Networks. In: International Workshop on Game Theory for Communications and Networks (GameNets), pp. 3–14 (2006)

    Google Scholar 

  23. Huang, Y., Xianjun, G., Whinston, A.: Defeating DDoS Attacks by Fixing the Incentive Chain. ACM Transactions on Internet Technology 7(1), 1–5 (2007)

    Article  Google Scholar 

  24. Wang, Y.Z., Lin, C., Wang, Y., Meng, K.: Security analysis of enterprise network based on Stochastic game nets model. In: ICC 2009 Communication and Information Systems Security Symposium (2009)

    Google Scholar 

  25. Lin, J., Liu, P., Jing, J.: Using Signaling Games to Model the Multi-step Attack-defense Scenarios on Confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  26. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A Survey of Game Theory as Applied to Network Security. In: 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1–10 (2010)

    Google Scholar 

  27. Segura, V., Lahuerta, J.: Modeling the Economic Incentives of DDoS Attacks: Femtocell Case Study. In: Moore, T., et al. (eds.) Economic of Information Security and Privacy 2010, pp. 107–119. Springer Science + Business Media, LLC (2010)

    Chapter  Google Scholar 

  28. Liu, P., Zang, W.: Incentive-based Modeling and Inference of Attacker Intent, Objectives, and Strategies. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 179–189. ACM, New York (2003)

    Google Scholar 

  29. Network Simulator, ns-2, http://nsnam.isi.edu/nsnam/index.php/Main_Page

  30. Arbor Networks: The business Value of DDoS Protection. White Paper (2011)

    Google Scholar 

  31. McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, Version 0.2010.09.01 (2010), http://www.gambit-project.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Y., Feng, D., Lian, Y., Chen, K., Zhang, Y. (2013). Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. In: Deng, R.H., Feng, T. (eds) Information Security Practice and Experience. ISPEC 2013. Lecture Notes in Computer Science, vol 7863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38033-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38033-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38032-7

  • Online ISBN: 978-3-642-38033-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics