Methodologies for evaluating game theoretic defense against DDoS attacks

@article{Khirwadkar2010MethodologiesFE,
  title={Methodologies for evaluating game theoretic defense against DDoS attacks},
  author={Tanmay Khirwadkar and Kien C. Nguyen and David M. Nicol and Tamer Basar},
  journal={Proceedings of the 2010 Winter Simulation Conference},
  year={2010},
  pages={697-707}
}
Distributed Denial of Service (DDoS) attacks on the Internet are used by attackers to be a nuisance, make a political statement (e.g. the 2009 attack against Estonia), or as a weapon of an Internet extortionist. Effective defense against these is a crucial study area, where advanced simulation techniques play a critical role, because of the enormous number of events involved. This paper considers a methodology for evaluating a game-theoretic defense against DDoS. We first describe a basic form… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-2 of 2 extracted citations

Game Theory for Cyber Security and Privacy

ACM Comput. Surv. • 2017
View 3 Excerpts
Highly Influenced

References

Publications referenced by this paper.

Controlling high bandwidth aggregates in the network

Computer Communication Review • 2002
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…