Abstract
Integration of the IoT (Internet of Things) with Cloud Computing, termed as the CoT (Cloud of Things) can help achieve the goals of the envisioned IoT and future Internet. In a typical CoT infrastructure, the data collected from wireless sensor networks and IoTs is transmitted through a SG (Smart Gateway) to the cloud. The bandwidth between an IoT access point and SG becomes a bottleneck for information transmission between the IoT and the cloud. We propose a novel game theory model to describe the CoT attacker, who expects to use minimum set and energy consumption of IoT attack devices to occupy as many bandwidth resources as possible in a given time period; and the defender, who expects to minimize false alarms. By analyzing this model, we have found that the game theory model is a non-cooperative and repeated incomplete information game, and Nash equilibrium is existent, perfected by the subgame. The best strategy for each stage of the attack is to adjust the attack link number dynamically based on the comparison results of value ϵ and turning point ϵ0 for each time period. At the same time, the defender adjusts the threshold value β dynamically, based on the comparison results of the Load value and expected value of a for each time period. The simulation result shows that our strategy can significantly mitigate the harm of a distributed denial of service attack.
Article PDF
References
BABU S M, LAKSHMI A J, RAO B T. A study on cloud based Internet of Things: CloudIoT[C]//Global Conference on Communication Technologies (GCCT), Thuckalay, India, 2015, 2015: 60–65.
CHANG K D, CHEN C Y, CHEN J L, et al. Internet of Things and cloud computing for future internet[M]. Security-enriched urban computing and smart grid, 2011: 1–10.
ZHOU J, LEPPANEN T, HARJULA E, et al. CloudThings: A common architecture for integrating the internet of things with cloud computing[C]//IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Whistler, Canada, 2013: 651–657.
CUI A, STOLFO S J. A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan[C]//The 26th Annual Computer Security Applications Conference, Austin, USA, 2010: 97–106.
PA Y M P, SUZUKI S, YOSHIOKA K, et al. IoTPOT: analysing the rise of IoT compromises[C]//The 9th USENIX Conference on Offensive Technologies, Washington, USA, 2015: 9.
HEINZELMAN W, CHANDRAKASAN A P, BALAKRISHNAN H. An application specific protocol architecture for wireless microsensor networks[J]. IEEE transactions on wireless communications, 2002, 1(4): 660–670.
BASSI A, HORN G. Internet of Things in 2020[C]//Joint European Commission/EPoSS Expert Workshop on RFID/Internet-of-Things, Brussels, Belgium, 2008.
VILMOS A, MEDAGLIA C, MORONI A, et al. Vision and challenges for realising the Internet of Things[J]. Hot working technology, 2010, 35(2): 59–60.
VERMESAN O, FRIESS P, GUILLEMIN P, et al. Internet of things strategic research roadmap[J]. Information security & technology, 2009, 29(16): 300–304.
ROMAN R, ZHOU J, LOPEZ J. On the features and challenges of security and privacy in distributed internet of things[J]. Computer networks, 2013, 7(10): 2266–2279.
ATZORI L, IERA A, MORABITO G. The internet of things: a survey[J]. Computer networks, 2010, 54(15): 2787–2805.
MIORANDI D, SICARI S, de Pellegrini F, et al. Internet of Things: vision, applications and research challenges[J]. Ad hoc networks, 2012, 10(7): 1497–1516.
PALATTELLA M R, ACCETTURA N, VILAJOSANA X, et al. Standardized protocol stack for the internet of (important) things[J]. IEEE communications surveys & tutorials, 2013, 15(3): 1389–1406.
SICARI S, RIZZARDI A, GRIECO L A, et al. Security, privacy and trust in Internet of Things: the road ahead[J]. Computer networks, 2015, 76: 146–164.
POTTIE G J. Wireless sensor networks[C]//Information Theory Workshop, Killarney, Ireland, 1998.
WANG Y, MA J, LU D, et al. From high-availability to collapse: quantitative analysis of “cloud-droplets-freezing” attack threats to virtual machine migration in cloud computing[J]. Cluster computing, 2014, 17(4): 1369–1381.
WANG Y, CHANDRASEKHAR S, SINGHAL M, et al. A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing[J]. Cluster computing, 2016, 19(2): 647–662.
BOTTA A, DE DONATO W, PERSICO V, et al. On the integration of cloud computing and internet of things[C]//International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 2014: 23–30.
AAZAM M, KHAN I, ALSAFFAR A A, et al. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved[C]//The 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 2014, 2014: 414–419.
AAZAM M, HUNG P P, HUH E N. Smart gateway based communication for cloud of things[C]//IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 2014, 2014: 1–6.
AGUZZI S, BRADSHAW D, CANNING M, et al. Definition of a research and innovation policy leveraging cloud computing and IoT Combination[EB/OL]. European commission, directorate-general of communications networks, content & technology, 2014, https://ec.europa.eu/digital-single-market/news/call-tenders-study-definition-research-and-innovation-policy-leveraging-cloud-computing-and-iot.
CHOI H, LEE H. Identifying botnets by capturing group activities in DNS Traffic[J]. Computer networks, 2012, 56(1): 20–33.
WANG K, HUANG C Y, LIN S J, et al. A fuzzy pattern-based filtering algorithm for botnet detection.[J]. Computer networks, 2011, 55(15): 3275–3286.
YAN G, HA D T, EIDENBENZ S. AntBot: Anti-pollution peer-to-peer botnets[J]. Computer networks, 2011, 55(8): 1941–1956.
ARORA K, KUMAR K, SACHDEVA M. Impact Analysis of Recent DDoS Attacks[J]. International journal on computer science & engineering, 2011, 3(2): 4–5.
SHIRLEY B, BABU L, MANO C. Bot detection evasion: a case study on localhost alert correlation bot detection methods[J]. Security and communication networks, 2012, 5(12): 1277–1295.
JAIKUMAR P, KAK A C. A graphtheoretic framework for isolating botnets in a network[J]. Security and communication networks, 2012, 5(16): 2605–2623.
GARG K, CHAWLA R. Detection of DDoS attacks using data mining[J]. International journal of computing and business research, 2011, 2(1): 2229–6166.
LACAGE M, HENDERSON T R. Yet another network simulator[R]. Institut National De Recherche En Informatique Et En Automatique Research Report: RR-5927, INRIA. 2006.
Author information
Authors and Affiliations
Additional information
This paper is supported by the Natural Science Founds of China (Nos. 61602376, U1334211, U1534208), Shaanxi Science and Technology Innovation Project (No. 2015KTZDGY01-04), Science Technology Project of Shaanxi Education Department (No. 16JK1573), Ph.D. Research Startup Funds of Xi’an University of Technology (No. 112-256081504), College Research Funds of Xi’an University of Technology (No.112-451016007).
WANG Yichuan [corresponding author] was born in Chengdu, China. He received his Ph.D. in computer system architecture from Xidian University of China in 2014. Now he is a Lecturer at Xi’an University of Technology, and with Shaanxi Key Laboratory of Network Computing and Security Technology. His research areas include cloud computing, trusted computing, and network security. (Email: chuan@xaut.edu.cn)
ZHANG Yefei was born in Datong, China. In 2013, she received her B.S. degree from Yuncheng Institute. Currently, she is a master’s candidate in the Faculty of Computer Science and Engineering, Xi’an University of Technology, Xi’an, China. Her research interests include cloud computing and network security. (Email: xiaxuena1@163.com)
HEI Xinhong was born in Yanan, China. He received his B.S. and M.S. degrees in computer science and technology from Xi’an University of Technology, Xi’an, China, in1998 and 2003, respectively, and his Ph.D. degree from Nihon University, Tokyo, Japan, in 2008. He is currently a professor with the Faculty of Computer Science and Engineering, Xian University of Technology, Xi’an, China. His current research interests include intelligent systems, safety-critical systems, and train control systems. (Email: heixinhong@xaut.edu.cn)
JI Wenjiang was born in Yanan, China. He obtained his B.S. and Ph.D from Xidian University in 2006 and2013, respectively. He is currently a lecturer in Xi’an University of Technology. His research interests include information and network security in VANET, privacy preserving in VANET and network simulation. (Email: wjj@xaut.edu.cn)
MA Weigang was born in Lanzhou, China. He received his Ph.D. degrees in computer system architecture from Xidian University of China in 2015. Currently, he is a Lecturer at Xi’an University of Technology and with Shaanxi Key Laboratory of Network Computing and Security Technology. His research areas include cloud computing, trusted computing and software reliability. (Email: mwg arkey@xaut.edu.cn)
Rights and permissions
About this article
Cite this article
Wang, Y., Zhang, Y., Hei, X. et al. Game strategies for distributed denial of service defense in the Cloud of Things. J. Commun. Inf. Netw. 1, 143–155 (2016). https://doi.org/10.1007/BF03391587
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/BF03391587