R. Guo, G. Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng
{"title":"基于dg的DDoS主动防御策略","authors":"R. Guo, G. Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng","doi":"10.1109/MUE.2008.53","DOIUrl":null,"url":null,"abstract":"In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of Bots that should blocked by defender. A differential games model is used to determine how a defender combats an attacker and protect the servers. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"DG-Based Active Defense Strategy to Defend against DDoS\",\"authors\":\"R. Guo, G. Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng\",\"doi\":\"10.1109/MUE.2008.53\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of Bots that should blocked by defender. A differential games model is used to determine how a defender combats an attacker and protect the servers. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.\",\"PeriodicalId\":203066,\"journal\":{\"name\":\"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MUE.2008.53\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MUE.2008.53","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DG-Based Active Defense Strategy to Defend against DDoS
In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of Bots that should blocked by defender. A differential games model is used to determine how a defender combats an attacker and protect the servers. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.