Downloads: 133 | Views: 289 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013 | Popularity: 6.3 / 10
A Defence Strategy against Flooding Attack Using Puzzles by Game Theory
Ch. V. N. Madhuri, R. V. Krishnaiah
Abstract: Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources Takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of Defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources
Keywords: Dos Attacks, Game Theory, Puzzles
Edition: Volume 2 Issue 9, September 2013
Pages: 234 - 237
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022
Pages: 21 - 24Minimax Algorithm and Alpha-Beta Pruning for Game Development Using Blockchain
Sumit S Shevtekar, Rutuja Kulkarni
Downloads: 102
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2832 - 2836Minimization of DDoS Attack using Firecol an Intrusion Prevention System
Bhagyashri Kotame, Shrinivas Sonkar
Downloads: 102
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1612 - 1616Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks
Vishal Mahale, Deepali Gothawal
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1368 - 1371Spam and Zombie Detection System with Machine Learned Spot Algorithm
Manishankar.S, Sobin E. S
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1747 - 1751Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud
Aaqib Iqbal Wani, Janaki Raman V., N. Priya