CFP last date
20 December 2024
Reseach Article

Game Theory based Defense Mechanism against Flooding Attack using Puzzle

Published on April 2012 by Raju Neyyan, Ancy Paul, Mayank Deshwal, Amit Deshmukh
Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
Foundation of Computer Science USA
ETCSIT - Number 5
April 2012
Authors: Raju Neyyan, Ancy Paul, Mayank Deshwal, Amit Deshmukh
85c10150-65d1-4d43-a5ad-969dd2692d70

Raju Neyyan, Ancy Paul, Mayank Deshwal, Amit Deshmukh . Game Theory based Defense Mechanism against Flooding Attack using Puzzle. Emerging Trends in Computer Science and Information Technology (ETCSIT2012). ETCSIT, 5 (April 2012), 6-10.

@article{
author = { Raju Neyyan, Ancy Paul, Mayank Deshwal, Amit Deshmukh },
title = { Game Theory based Defense Mechanism against Flooding Attack using Puzzle },
journal = { Emerging Trends in Computer Science and Information Technology (ETCSIT2012) },
issue_date = { April 2012 },
volume = { ETCSIT },
number = { 5 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 6-10 },
numpages = 5,
url = { /proceedings/etcsit/number5/5992-1034/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%A Raju Neyyan
%A Ancy Paul
%A Mayank Deshwal
%A Amit Deshmukh
%T Game Theory based Defense Mechanism against Flooding Attack using Puzzle
%J Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%@ 0975-8887
%V ETCSIT
%N 5
%P 6-10
%D 2012
%I International Journal of Computer Applications
Abstract

Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources

References
  1. D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage,"Inferring Internet Denial-of-Service Activity," ACM Trans. Computer Systems, vol. 24, no. 2, pp. 115-139, May 2006.
  2. A. Hussain, J. Heidemann, and C. Papadopoulos, "A Frameworkfor Classifying Denial of Service Attacks," Proc. ACMSIGCOMM '03, pp. 99-110, 2003.
  3. A. R. Sharafat and M. S. Fallah, "A Framework for the Analysisof Denial of Service Attacks," The Computer J. , vol. 47, no. 2,pp. 179-192, Mar. 2004.
  4. Mehran S. Fallah, A Puzzle-Based Defence Strategy AgainstFlooding Attacks Using Game Theory, IEEE transactions on dependable and secure computing, vol. 7, no. 1, pg 5-19.
  5. C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram,and D. Zamboni, "Analysis of a Denial of Service Attack on TCP,"Proc. 18th IEEE Symp. Security and Privacy, pp. 208-223, 1997.
  6. Smurf IP Denial-of-Service Attacks. CERT Coordination Center,Carnegie Mellon Univ. , 1998.
  7. Denial-of-Service Tools. CERT Coordination Center, CarnegieMellon Univ. , 1999.
  8. J. Ioannidis and S. Bellovin, "Implementing Pushback: Router- Bssed Defence against DDoS Attacks," Proc. Network andDistributed System Security Symp. (NDSS '02), pp. 6-8, 2002.
  9. D. Song and A. Perrig, "Advanced and Authenticated MarkingSchemes for IP Traceback," Proc. IEEE INFOCOM '01, pp. 878-886,2001.
  10. A. Yaar, D. Song, and A. Perrig, "SIFF: A Stateless Internet FlowFilter to Mitigate DDoS Flooding Attacks," Proc. IEEE Symp. Security and Privacy, pp. 130-146, 2004.
  11. E. Bursztein and J. Goubalt-Larrecq. A logical framework for evaluating network resilience againstfaults and attacks. Lecture Notes in Computer Science; Vol. 4846, 2007
  12. W. Sun, X. Kong, D. He, and X. You. Information security problem research based on game theory. International Symposium on Publication Electronic Commerce and Security, 2008.
  13. R. C. Merkle. "Secure Communications Over Insecure Channels," In Communications of the ACM. April, 1978.
  14. A. Juels and J. Brainard. "Client Puzzles: A cryptographic defence against connection depletion attacks," In Proceedings of NDSS '99 (Networks and Distributed Systems Security), 1999, pages 151-165.
  15. T. Aura, P. Nikander, and J. Leiwo. "DoS-Resistant Authentication with Client Puzzles," Lecture Notes in Computer Science, vol. 2133, 2001.
  16. C. Dwork and M. Naor. "Pricing via Processing or Combating Junk Mail," In Advances in Cryptology – Crypto '92. Spring-Verlag, LNCS volume 740, pp. 129-147, August 1992.
  17. J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers, pages 195–208, 2003.
  18. Q. Wu, S. Shiva, S. Roy, C. Ellis, V. Datla, and D. Dasgupta. On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks. 43rd Annual Simulation Symposium (ANSS10), part of the 2010 Spring Simulation MultiConference, April 11-15, 2010.
  19. W. Feng, E. Kaiser, W. Feng, and A. Luu, "The Design andImplementation of Network Puzzles," Proc. 24th Ann. Joint Conf. IEEE Computer and Comm. Societies, pp. 2372-2382, 2005.
  20. X. Wang and M. Reiter, "Defending Against Denial-of-ServiceAttacks with Puzzle Auctions," Proc. IEEE Security and Privacy,pp. 78-92, 2003.
  21. ShibiaoLin ,Tzi-ckerChiueh A Survey on Solutions to Distributed Denial of Service Attacks
  22. Vicky Laurens, Abdulmotaleb El Saddik, and Amiya Nayak, Requirements for Client Puzzles to Defeat the Denial of Service and the Distributed Denial of Service Attacks
  23. B. Bencsath, I. Vajda, and L. Buttyan, "A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks," Proc. 11th Int'l Conf. Software, Telecomm. , and Computer Networks, pp. 763- 767, 2003.
  24. Merkle R. C. , "Secure Communications Over Insecure Channels," Communications of ACM, vol. 21, no. 4, pp. 294-299, April 1978
  25. A. Juels and J. Brainard. "Client Puzzles: A cryptographic defense against connection depletion attacks," In Proceedings of NDSS '99 (Networks and Distributed Systems Security), 1999, pages 151-165.
  26. T. Aura, P. Nikander, and J. Leiwo. "DoS-Resistant Authentication with Client Puzzles," Lecture Notes in Computer Science, vol. 2133, 2001.
  27. D. Wheeler and R. Needham. "TEA, a Tiny Encryption Algorithm," Unpublished Manuscript. Available at:http://www. ftp. cl. cam. ac. uk/ftp/papers/djw-rmn/djw-rmn-tea. html. November, 1994.
  28. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. "Handbook of Applied Cryptography. "CRC Press, 1996.
  29. W. Sun, X. Kong, D. He, and X. You. Information security problem research based on game theory. International Symposium on Publication Electronic Commerce and Security, 2008.
  30. R. C. Merkle. "Secure Communications Over Insecure Channels," In Communications of the ACM. April, 1978.
  31. Timothy J. McNevin, Jung-Min Park, and Randolph Marchany. "pTCP: A Client Puzzle Protocol For Defending Against Resource Exhaustion Denial of Service Attacks"
  32. K. Lye and J. M. Wing. Game strategies in network security. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, 2002.
  33. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu. A survey of game theory as applied to network security. The 43rd Hawaii International Conference on System Sciences, 2010.
  34. Mehran S. Fallah, A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 7, NO. 1, JANUARY-MARCH 2010
  35. John Ioannidis, Steven M. Bellovin, Implementing Pushback: Router-Based Defense Against DDoS Attacks
  36. Tanmay Sanjay Khirwadkar, Defense Against Network Attacks Using Game Theory, University Of Illinois At Urbana-Champaign, 2011
  37. Timothy J. McNevin, Jung-Min Park, and Randolph Marchany, pTCP: A Client Puzzle Protocol For Defending Against Resource Exhaustion Denial of Service Attacks
Index Terms

Computer Science
Information Sciences

Keywords

Dos Attacks Game Theory Puzzles