期刊文献+

服务跳变抗DoS机制的博弈理论分析 被引量:7

A Game Theoretic Analysis of Service Hopping Mechanism for DoS Defense
下载PDF
导出
摘要 该文对DoS攻防进行不完全信息博弈分析,讨论了DoS防范的困境,指出信息的不对称性和未能形成服务方-用户联盟是防范困境的根本原因。通过引入服务跳变策略,增加服务类型并建立服务方-用户联盟,即可构造新的DoS攻防博弈均衡,理论上证明了服务跳变策略具有主动的抗DoS特性,对于服务跳变与DoS主动防范策略研究具有理论意义。 A game-theoretic analysis of security interactive behavior is performed between the DoS attacker and the defender under incomplete information. The dilemma of defense is discussed and the underlying fact is revealed that asymmetric nature of information and absence of server-user coalition lead to the dilemma. An improved DoS game is performed which can acquire new equilibrium through service hopping tactic, increasing service type and establishing the server-user coalition. Theoretical analysis shows that service hopping tactic is active and efficient for DoS defense. It is fundamental and important for service hopping mechanism and DoS defense.
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第1期228-232,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60577039) 天津市科技发展计划项目基金(05YFGZGX24200)资助项目
关键词 拒绝服务 博弈论 纳什均衡 服务跳变 联盟 Denial of Service (DOS) Game theory Nash equilibrium Service hopping Coalition
  • 相关文献

参考文献12

  • 1Savage S, Wetherall D, and Karlin A, et al.. Practical network support for ip traceback. Proc. ACM SIGCOMM 2000. New York, 2000: 295-306.
  • 2Bellovin S. The ICMP traceback message, http://www. research.att.com, 2000.
  • 3Ferguson P and Senie D. Network ingress filtering: Defeating denial of service attacks which employs ip source address spoofing, http://www.ietf.org/rfc/rfc2267.txt, 1998.
  • 4SANS Institute. Egress filtering, http://www.sans.org/y2k /egress.htm, 2000.
  • 5Wang J and Lu L. Tolerating denial of service attacks using overlay networks: Impact of overlay network topology. Proc. 1st ACM Workshop on Survivable and Serf-Regenerative Systems, Fairfax VA, 2003: 43-52.
  • 6Lee H C J and Thing V L L. Port hopping for resilient networks. Proc. 60th IEEE Vehicular Technology Conference, Washington, 2004: 3291-3295.
  • 7Atighetchi M, Pal P, and Webber F, et al.. Adaptive use of network-centric mechanisms in cyber-defense. Proc. 6th IEEE Int'l Syrup. Object-Oriented Real-Time Distributed Computing, Hokkaido, 2003: 183-192.
  • 8Shi L, Jia C, and Lu S, et al. Port and address hopping for active cyber-defense. Pacific Asia Workshop on Intelligence and Security Informatics, Chengdu, 2007, LNCS 4430: 295-300.
  • 9Shi L, Jia C, and Lu S, et al.. DoS evading mechanism upon service hopping. IFIP International Conference on Network and Parallel Computing, Dalian, 2007: 119-122.
  • 10Sifalakis M, et al.. Network address hopping: a mechanism to enhance data protection for packet communications. IEEE International Conference on Communications, Seoul, 2005: 1518-1523.

二级参考文献4

  • 1[1]B V John.A conceptual model of hacker development and motivations.Journal of E-Business,2001,1(2):1-9
  • 2[2]B Schneier.Attack trees:Modeling security threats.Dr Dobb's Journal of Software Tools,1999,24(12):21-29
  • 3[3]M Rogers.Psychology of hackers:A new taxonomy available.http://ww.infowar.com,2001
  • 4向叔文.约束条件下的 Nash 平衡点[J].贵州工业大学学报(自然科学版),1998,27(4):14-16. 被引量:1

共引文献10

同被引文献108

引证文献7

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部