CFP last date
20 May 2024
Reseach Article

Game Theory based defence mechanism against Flooding attack using Puzzle

Published on April 2012 by Raju Neyyan, Ancy Paul, Mayank Deshwal
International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012)
Foundation of Computer Science USA
IRAFIT - Number 2
April 2012
Authors: Raju Neyyan, Ancy Paul, Mayank Deshwal
5ea864d4-24ff-40a3-9b1f-7e3c9204e6d5

Raju Neyyan, Ancy Paul, Mayank Deshwal . Game Theory based defence mechanism against Flooding attack using Puzzle. International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012). IRAFIT, 2 (April 2012), 35-40.

@article{
author = { Raju Neyyan, Ancy Paul, Mayank Deshwal },
title = { Game Theory based defence mechanism against Flooding attack using Puzzle },
journal = { International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012) },
issue_date = { April 2012 },
volume = { IRAFIT },
number = { 2 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 35-40 },
numpages = 6,
url = { /proceedings/irafit/number2/5859-1015/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012)
%A Raju Neyyan
%A Ancy Paul
%A Mayank Deshwal
%T Game Theory based defence mechanism against Flooding attack using Puzzle
%J International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012)
%@ 0975-8887
%V IRAFIT
%N 2
%P 35-40
%D 2012
%I International Journal of Computer Applications
Abstract

Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources.

References
  1. D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage,"Inferring Internet Denial-of-Service Activity," ACM Trans.Computer Systems, vol. 24, no. 2, pp. 115-139, May 2006.
  2. A. Hussain, J. Heidemann, and C. Papadopoulos, "A Frameworkfor Classifying Denial of Service Attacks," Proc. ACMSIGCOMM '03, pp. 99-110, 2003.
  3. A.R. Sharafat and M.S.Fallah, "A Framework for the Analysisof Denial of Service Attacks," The Computer J., vol. 47, no. 2,pp. 179-192, Mar. 2004.
  4. C.L. Schuba, I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram,and D. Zamboni, "Analysis of a Denial of Service Attack on TCP,"Proc. 18th IEEE Symp. Security and Privacy, pp. 208-223, 1997.
  5. Smurf IP Denial-of-Service Attacks. CERT Coordination Center,Carnegie Mellon Univ., 1998.
  6. Denial-of-Service Tools. CERT Coordination Center, CarnegieMellon Univ., 1999.
  7. Denial-of-Service Attack via Ping. CERT Coordination Center,Carnegie Mellon Univ., 1996.
  8. IP Denial-of-Service Attacks. CERT Coordination Center, CarnegieMellon Univ., 1997.
  9. J. Ioannidis and S. Bellovin, "Implementing Pushback: Router- Bssed Defence against DDoS Attacks," Proc. Network andDistributed System Security Symp. (NDSS '02), pp. 6-8, 2002.
  10. D. Song and A. Perrig, "Advanced and Authenticated MarkingSchemes for IP Traceback," Proc. IEEE INFOCOM '01, pp. 878-886,2001.
  11. A. Yaar, D. Song, and A. Perrig, "SIFF: A Stateless Internet FlowFilter to Mitigate DDoS Flooding Attacks," Proc. IEEE Symp.Security and Privacy, pp. 130-146, 2004.
  12. J. Leiwo, P. Nikander, and T. Aura, "Towards Network Denial ofService Resistant Protocols," Proc. 15th Int'l Information SecurityConf., pp. 301-310, 2000.
  13. W. Feng, E. Kaiser, W. Feng, and A. Luu, "The Design andImplementation of Network Puzzles," Proc. 24th Ann. Joint Conf.IEEE Computer and Comm. Societies, pp. 2372-2382, 2005.
  14. X. Wang and M. Reiter, "Defending Against Denial-of-ServiceAttacks with Puzzle Auctions," Proc. IEEE Security and Privacy,pp. 78-92, 2003.
  15. H. Gintis, Game Theory Evolving: A Problem-Centered Introduction toModeling and Strategic Behavior. Princeton Univ. Press, pp. 129-130,2000.
  16. D. Fudenberg and E. Maskin, "The Folk Theorem for RepeatedGames with Discounting and Incomplete Information," Econometrica,vol. 54, no. 3, pp. 533-554, May 1986.
  17. M. Abadi, M. Burrows, M. Manasse, and T. Wobber, "ModeratelyHard, Memory-Bound Functions," Proc. Network and DistributedSystem Security Symp. (NDSS '03), pp. 25-39, 2003.
  18. Boldizs´ar Bencs´ath Istv´an Vajda Levente Butty´an A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks
  19. Mehran S. Fallah, A Puzzle-Based Defence Strategy Against Flooding Attacks Using Game Theory, IEEE transactions on dependable and secure computing, vol. 7, no. 1, pg 5-19.
  20. E. Bursztein and J. Goubalt-Larrecq. A logical framework for evaluating network resilience against faults and attacks. Lecture Notes in Computer Science; Vol. 4846, 2007
  21. W. Sun, X. Kong, D. He, and X. You. Information security problem research based on game theory. International Symposium on Publication Electronic Commerce and Security, 2008.
  22. R. C. Merkle. "Secure Communications Over Insecure Channels," In Communications of the ACM. April, 1978.
  23. A. Juels and J. Brainard. "Client Puzzles: A cryptographic defence against connection depletion attacks," In Proceedings of NDSS '99 (Networks and Distributed Systems Security), 1999, pages 151-165.
  24. T. Aura, P. Nikander, and J. Leiwo. "DoS-Resistant Authentication with Client Puzzles," Lecture Notes in Computer Science, vol. 2133, 2001.
  25. C. Dwork and M. Naor. "Pricing via Processing or Combating Junk Mail," In Advances in Cryptology – Crypto '92.Spring-Verlag, LNCS volume 740, pp. 129-147, August 1992.
  26. Quishi Wu, Sajama Shiva, Tankards Roy, Charles Ellis, ViveData, On Modeling and Simulation of Game Theory-based Defence Mechanisms against DoS and DDoS Attacks
Index Terms

Computer Science
Information Sciences

Keywords

Dos Attack Game Theory Puzzle Based Defence