A Game-Theoretic Approach for AI-based Botnet Attack Defence

12/04/2021
by   Hooman Alavizadeh, et al.
0

The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid detection. Unfortunately, there has not been an existing assessment tool capable of evaluating the effectiveness of existing defense strategies against this kind of AI-based botnet attack. In this paper, we propose a sequential game theory model that is capable to analyse the details of the potential strategies botnet attackers and defenders could use to reach Nash Equilibrium (NE). The utility function is computed under the assumption when the attacker launches the maximum number of DDoS attacks with the minimum attack cost while the defender utilises the maximum number of defense strategies with the minimum defense cost. We conduct a numerical analysis based on a various number of defense strategies involved on different (simulated) cloud-band sizes in relation to different attack success rate values. Our experimental results confirm that the success of defense highly depends on the number of defense strategies used according to careful evaluation of attack rates.

READ FULL TEXT

page 5

page 12

research
09/08/2023

Computation of Nash Equilibria of Attack and Defense Games on Networks

We consider the computation of a Nash equilibrium in attack and defense ...
research
07/20/2021

A Markov Game Model for AI-based Cyber Security Attack Mitigation

The new generation of cyber threats leverages advanced AI-aided methods,...
research
12/22/2022

Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep Learning

This paper presents a game-theoretic framework to study the interactions...
research
02/27/2019

Attack-Defense Quantification Based On Game-Theory

With the developing of the attack and defense technology, the cyber envi...
research
08/22/2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

Honeypots play a crucial role in implementing various cyber deception te...
research
08/26/2019

Novel Stealthy Attack and Defense Strategies for Networked Control Systems

This paper studies novel attack and defense strategies, based on a class...
research
03/13/2023

Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries

Recently, the Integrated Air Defense System (IADS) has become vital for ...

Please sign up or login with your details

Forgot password? Click here to reset