By Topic

Methodologies for evaluating game theoretic defense against DDoS attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Tanmay Khirwadkar ; Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W Main St., 61801, USA ; Kien C. Nguyen ; David M. Nicol ; Tamer Başar

Distributed Denial of Service (DDoS) attacks on the Internet are used by attackers to be a nuisance, make a political statement (e.g. the 2009 attack against Estonia), or as a weapon of an Internet extortionist. Effective defense against these is a crucial study area, where advanced simulation techniques play a critical role, because of the enormous number of events involved. This paper considers a methodology for evaluating a game-theoretic defense against DDoS. We first describe a basic form of the defense, note the performance limitations suffered by a naive implementation, and then consider methodologies in which a parallelized approach may accelerate performance.

Published in:

Simulation Conference (WSC), Proceedings of the 2010 Winter

Date of Conference:

5-8 Dec. 2010