Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach

12/20/2019
by   Abdullah Aydeger, et al.
0

With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming extremely challenging to design a fully protected network. For instance, Stealthy Link Flooding Attack (SLFA) is a variant of DDoS attacks that strives to block access to a target area by flooding a small set of links, and it is shown that it can bypass traditional DDoS defense mechanisms. One potential solution to tackle such SLFAs is to apply Moving Target Defense (MTD) techniques in which network settings are dynamically changed to confuse/deceive attackers, thus making it highly expensive to launch a successful attack. However, since MTD comes with some overhead to the network, to find the best strategy (i.e., when and/or to what extent) of applying it has been a major challenge. The strategy is significantly influenced by the attacker's behavior that is often difficult to guess. In this work, we address the challenge of obtaining the optimal MTD strategy that effectively mitigates SLFAs while incurs a minimal overhead. We design the problem as a signaling game considering the network defender and the attacker as players. A belief function is established throughout the engagement of the attacker and the defender during this SLFA campaign, which is utilized to pick the best response/action for each player. We analyze the game model and derive a defense mechanism based on the equilibria of the game. We evaluate the technique on a Mininet-based network environment where an attacker is performing SLFAs and a defender applies MTD based on equilibria of the game. The results show that our signaling game-based dynamic defense mechanism can provide a similar level of protection against SLFAs like the extensive MTD solution, however, causing a significantly reduced overhead.

READ FULL TEXT
research
01/25/2023

Evaluating Deception and Moving Target Defense with Network Attack Simulation

In the field of network security, with the ongoing arms race between att...
research
06/26/2023

Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games

Cyber-physical microgrids are vulnerable to rootkit attacks that manipul...
research
04/30/2019

Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

Abuse of zero-permission sensors on-board mobile and wearable devices to...
research
02/21/2020

Green Security Game with Community Engagement

While game-theoretic models and algorithms have been developed to combat...
research
01/19/2018

Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

Advanced Persistent Threat (APT) attackers apply multiple sophisticated ...
research
10/08/2020

Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments

Electric power grid components, such as high voltage transformers (HVTs)...
research
03/24/2021

Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

This study investigates general model-based incident handler's asymptoti...

Please sign up or login with your details

Forgot password? Click here to reset