Loading...
Please wait, while we are loading the content...
Similar Documents
Methodologies for evaluating game theoretic defense against ddos attacks.
Content Provider | CiteSeerX |
---|---|
Author | Johansson, B. Jain, S. Montoya-Torres, J. Hugan, J. Yücesan, E. Khirwadkar, Tanmay Nguyen, Kien C. Nicol, David M. |
Abstract | Distributed Denial of Service (DDoS) attacks on the Internet are used by attackers to be a nuisance, make a political statement (e.g. the 2009 attack against Estonia), or as a weapon of an Internet extortionist. Effective defense against these is a crucial study area, where advanced simulation techniques play a critical role, because of the enormous number of events involved. This paper considers a methodology for evaluating a game-theoretic defense against DDoS. We first describe a basic form of the defense, note the performance limitations suffered by a naive implementation, and then consider methodologies in which a parallelized approach may accelerate performance. 1 |
File Format | |
Access Restriction | Open |
Subject Keyword | Naive Implementation Effective Defense Internet Extortionist Game-theoretic Defense Critical Role Enormous Number Parallelized Approach Crucial Study Area Basic Form Performance Limitation Political Statement Advanced Simulation Technique |
Content Type | Text |
Resource Type | Article |