Part of the book series:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ((LNICST,volume 568))
Included in the following conference series:
126Accesses
Abstract
Distributed denial-of-service (DDoS) attacks are becoming more frequent and powerful. Traditionaledge defense solutions can no longer keep up, andin-network defense solutions are needed that involve multiple Internet Service Providers (ISPs) to collaboratively defend against the attacks. While collaborative defense solutions are technically more effective at stopping large-scale attacks, the incentives for ISPs to deploy these solutions remain unexplored. In this study, we develop a game theoretic model to capture the economic benefits and costs of deployment for ISPs competing for customers. Through large-scale simulations at the Internet level, we find that the majority of ISPs on the Internet have an economic incentive to participate in DDoS defense, driven by competition; and that the severity of DDoS attacks and the level of competition affect an ISP’s charge for filtering DDoS traffic for its customers.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 9723
- Price includes VAT (Japan)
- Softcover Book
- JPY 12869
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cisco annual internet report (2018–2023) white paper (2020).https://www.cisco.com/c/en/us/solutions/executive-perspectives/annual-internet-report
Anderson, S.P., De Palma, A., Thisse, J.F.: Discrete Choice Theory of Product Differentiation. MIT Press, Cambridge (1992)
Bedi, H.S., Roy, S., Shiva, S.: Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 129–136 (2011)
Blume, L.E.: The statistical mechanics of strategic interaction. Games Econom. Behav.5(3), 387–424 (1993)
Blume, L.E., Brock, W.A., Durlauf, S.N., Jayaraman, R.: Linear social interactions models. J. Polit. Econ.123(2), 444–496 (2015)
Bohawek, S., Hespanha, J.P., Lee, J., Lim, C., Obraczka, K.: Game theoretic stochastic routing for fault tolerance and security in computer networks. IEEE Trans. Parallel Distrib. Syst.18(9), 1227–1240 (2007)
Brock, W.A.: Pathways to randomness in the economy: emergent nonlinearity and chaos in economics and finance. Estud. Econ. 3–55 (1993)
Brock, W.A., Durlauf, S.N.: Discrete choice with social interactions. Rev. Econ. Stud.68(2), 235–260 (2001)
Brock, W.A., Durlauf, S.N.: A multinomial-choice model of neighborhood effects. Am. Econ. Rev.92(2), 298–303 (2002)
CAIDA: As relationships dataset (2019).http://www.caida.org/data/as-relationships/
Durlauf, S.N., Ioannides, Y.M.: Social interactions. Annu. Rev. Econ.2(1), 451–478 (2010)
Gao, L.: On inferring autonomous system relationships in the Internet. IEEE/ACM Trans. Netw.9(6), 733–745 (2001)
Gill, P., Schapira, M., Goldberg, S.: Let the market drive deployment: a strategy for transitioning to BGP security. In: Proceedings of the ACM SIGCOMM 2011 Conference on SIGCOMM, pp. 14–25 (2011)
Goeree, J.K., Holt, C.A., Palfrey, T.R.: Regular quantal response equilibrium. Exp. Econ.8(4), 347–367 (2005)
Grossklags, J., Christin, N., Chuang, J.: Security and insurance management in networks with heterogeneous agents. In: Proceedings of the 9th ACM Conference on Electronic Commerce, pp. 160–169 (2008)
Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: a game-theoretic analysis of information security games. In: Proceeding of the 17th International Conference on World Wide Web, vol. 7, no. 1, pp. 209–218 (2008)
Huang, Y., Geng, X., Whinston, A.B.: Defeating DDoS attacks by fixing the incentive chain. ACM Trans. Internet Technol.7(1), 5–es (2007)
Kang, M.S., Lee, S.B., Gligor, V.D.: The crossfire attack. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 127–141. IEEE (2013)
Kottler, S.: February 28th DDoS incident report. GitHub Engineering (2018).https://githubengineering.com/ddos-incident-report/
Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv.47(2), 1–38 (2014)
Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V., et al.: As relationships, customer cones, and validation. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 243–256. ACM (2013)
Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J.P.: Game theory meets network security and privacy, vol. 45 (2013)
McFadden, D.: Conditional logit analysis of qualitative choice behavior. In: Zarembka (ed.) Frontiers in Econometrics, pp. 105–142 (1973)
McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econom. Behav.10(1), 6–38 (1995)
Miura-Ko, R.A., Yolken, B., Mitchell, J., Bambos, N.: Security decision-making among interdependent organizations. In: 2008 21st IEEE Computer Security Foundations Symposium, pp. 66–80 (2008)
Papadimitriou, C.H.: Algorithms, games, and the internet. In: Proceedings of the Thirtythird Annual ACM Symposium on Theory of Computing, pp. 749–753 (2001)
RIPE RIS: RIPE RIS raw data (2019).https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris/ris-raw-data
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–10 (2010)
Sami, R., Katabi, D., Faratin, P., Wroclawski, J.: Practice and theory of incentives in networked systems (PINS): workshop report (2004)
Samuelson, P.A., Nordhaus, W.D.: Microeconomics, ISE editions (2001)
Shen, Y., Yan, Z., Kantola, R.: Game theoretical analysis of the acceptance of global trust management for unwanted traffic control. In: 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pp. 935–942 (2013)
Shiva, S., Roy, S., Dasgupta, D.: Game theory for cyber security. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, vol. 34 (2010)
University of Oregon: Route Views project (2019).http://www.routeviews.org
Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks. In: Proceedings of the 2010 Spring Simulation Multiconference on - SpringSim 2010, p. 10 (2010)
Acknowledgment
This project is in part the result of funding provided by the Science and Technology Directorate of the United States Department of Homeland Security under contract number D15PC00204. The views and conclusions contained herein are those of the authors and should not be interpreted necessarily representing the official policies or endorsements, either expressed or implied, of the Department of Homeland Security or the US Government.
Author information
Authors and Affiliations
University of Oregon, Eugene, USA
Mingwei Zhang, Jun Li & Jiabin Wu
University California, Los Angeles, USA
Peter Reiher
- Mingwei Zhang
You can also search for this author inPubMed Google Scholar
- Jun Li
You can also search for this author inPubMed Google Scholar
- Jiabin Wu
You can also search for this author inPubMed Google Scholar
- Peter Reiher
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toJun Li.
Editor information
Editors and Affiliations
Tsinghua University, Beijing, China
Haixin Duan
Concordia University, Montreal, QC, Canada
Mourad Debbabi
Hong Kong Polytechnic University, Kowloon, Hong Kong
Xavier de Carné de Carnavalet
Hong Kong Polytechnic University, Kowloon, Hong Kong
Xiapu Luo
Stevens Institute of Technology, Hoboken, USA
Xiaojiang Du
Hong Kong Polytechnic University, Kowloon, Hong Kong
Man Ho Allen Au
Rights and permissions
Copyright information
© 2025 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, M., Li, J., Wu, J., Reiher, P. (2025). A Game Theoretical Analysis of Distributed Denial-of-Service Defense Incentive. In: Duan, H., Debbabi, M., de Carné de Carnavalet, X., Luo, X., Du, X., Au, M.H.A. (eds) Security and Privacy in Communication Networks. SecureComm 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 568. Springer, Cham. https://doi.org/10.1007/978-3-031-64954-7_1
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-031-64953-0
Online ISBN:978-3-031-64954-7
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative