Making greed work in networks: a game-theoretic analysis of switch service disciplines
IEEE/ACM Transactions on Networking (TON)
A game-theoretic approach towards congestion control in communication networks
ACM SIGCOMM Computer Communication Review
Efficient packet marking for large-scale IP traceback
Proceedings of the 9th ACM conference on Computer and communications security
Selfish behavior and stability of the internet:: a game-theoretic analysis of TCP
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Adjusted Probabilistic Packet Marking for IP Traceback
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
GOSSIB vs. IP Traceback Rumors
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
On selfish routing in internet-like environments
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Free-riding and whitewashing in peer-to-peer systems
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Incentive-based modeling and inference of attacker intent, objectives, and strategies
ACM Transactions on Information and System Security (TISSEC)
IEEE/ACM Transactions on Networking (TON)
Game-Based Analysis of Denial-of-Service Prevention Protocols
CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
IEEE Transactions on Parallel and Distributed Systems
TCP Connection Game: A Study on the Selfish Behavior of TCP Users
ICNP '05 Proceedings of the 13TH IEEE International Conference on Network Protocols
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Hi-index | 0.02 |
Congestion in the routers as well as certain types of resource-exhaustion DoS attacks at the servers can be treated by differentiating packet processing according to previous history of its source. Since it is often difficult to correctly classify packets as legitimate or attack traffic, the scheduling algorithm should tolerate imprecise labeling of packets as long as on the average it punishes misbehaving sources. In this paper, we propose a game-theoretic model based on player rating and formulate the problem in terms of optimal control theory. Applying the Pontryagin maximum principle, we derive necessary control functions to encourage good behavior of network players. As an application of results, we suggest two algorithms for differentiating packet treatment in congested servers and routers.