Multi-objective game for fighting against Distributed Reflection DoS attacks in software-defined network
Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits vulnerabilities in existing protocols by using a botnet to send forged query packets to more than one device which are used as reflectors. As a resul...
Saved in:
| Published in | Array (New York) Vol. 26; p. 100410 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier Inc
01.07.2025
Elsevier |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2590-0056 2590-0056 |
| DOI | 10.1016/j.array.2025.100410 |
Cover
| Abstract | Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits vulnerabilities in existing protocols by using a botnet to send forged query packets to more than one device which are used as reflectors. As a result, a stream of replies is sent to a victim node or subnet which overwhelms it. Several security measures have been proposed to counter such attacks, unfortunately, most of them do not consider the attacker’s dynamics. Furthermore, limiting the growth of the botnet could significantly reduce the impact of such an attack. In this paper, we leverage the advantages of software-defined networks (SDN) to propose a game-theoretic approach that predicts the defender’s best moves based on Nash strategies to mitigate this attack while avoiding botnet expansion. This approach is a non-cooperative multi-objective game between the attacker which aims to (1) compromise more nodes to scale the volume of its attack, (2) launch a volumetric-based DrDoS in the network, and the defender which aims to avoid it. This game results in a mixed-strategy Pareto-Nash equilibrium. It includes a player utility-based algorithm to detect malicious flows (or nodes) and drop them (or patch them). The results of the Matlab simulation show that the proposed model is an effective means of mitigating DrDoS attacks. To the best of our knowledge, this study is the first attempt to design a defense system based on multi-objective game to counter the effects of DrDoS in SDN. |
|---|---|
| AbstractList | Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits vulnerabilities in existing protocols by using a botnet to send forged query packets to more than one device which are used as reflectors. As a result, a stream of replies is sent to a victim node or subnet which overwhelms it. Several security measures have been proposed to counter such attacks, unfortunately, most of them do not consider the attacker’s dynamics. Furthermore, limiting the growth of the botnet could significantly reduce the impact of such an attack. In this paper, we leverage the advantages of software-defined networks (SDN) to propose a game-theoretic approach that predicts the defender’s best moves based on Nash strategies to mitigate this attack while avoiding botnet expansion. This approach is a non-cooperative multi-objective game between the attacker which aims to (1) compromise more nodes to scale the volume of its attack, (2) launch a volumetric-based DrDoS in the network, and the defender which aims to avoid it. This game results in a mixed-strategy Pareto-Nash equilibrium. It includes a player utility-based algorithm to detect malicious flows (or nodes) and drop them (or patch them). The results of the Matlab simulation show that the proposed model is an effective means of mitigating DrDoS attacks. To the best of our knowledge, this study is the first attempt to design a defense system based on multi-objective game to counter the effects of DrDoS in SDN. |
| ArticleNumber | 100410 |
| Author | Chassem Kamdem, Priva Kengne Tchendji, Vianney Velempini, Mthulisi |
| Author_xml | – sequence: 1 givenname: Vianney orcidid: 0000-0003-3836-1859 surname: Kengne Tchendji fullname: Kengne Tchendji, Vianney email: vianney.kengnetchendji@ul.ac.za, vianneykengne@yahoo.fr organization: Department of Computer Science, University of Limpopo, Mankweng, PO Box 0727, South Africa – sequence: 2 givenname: Mthulisi orcidid: 0000-0003-1619-7429 surname: Velempini fullname: Velempini, Mthulisi email: mthulisi.velempini@ul.ac.za organization: Department of Computer Science, University of Limpopo, Mankweng, PO Box 0727, South Africa – sequence: 3 givenname: Priva orcidid: 0009-0007-6550-5885 surname: Chassem Kamdem fullname: Chassem Kamdem, Priva email: priva.chassem@univ-dschang.org organization: Department of Mathematics and Computer Science, University of Dschang, Dschang, PO Box 67, Cameroon |
| BookMark | eNqNkMtq3TAQhkVJoWmaJ-hGL-BTyZJsedFFSdo0kBLIZS3G8siR40hB0snhvH194lK6KlnNhfl-hu8jOQoxICGfOdtwxpsv0wZSgv2mZrVaNkxy9o4c16pjFWOqOfqn_0BOc54YWy4550ofk4df27n4KvYT2uJfkI7whNTFRJ0fH4oPI4URfMiFnvtcku-3BQd6g24-ADHQ83hLoRSwj5n6QHN0ZQcJqwGdD8tpwLKL6fETee9gznj6p56Q-x_f785-VlfXF5dn364qK5qmVIhaSdH3squ56pWVrRZadOhk63jHO615zTkw6LvGcdZrJxE6UWvmlFRNLU7I5Zo7RJjMc_JPkPYmgjevi5hGA6l4O6NxfOhaJoG1fS2d0lA71y6DsKoRQzssWXLN2oZn2O9gnv8GcmYO8s1kXuWbg3yzyl8wsWI2xZwTujdSX1cKFzsvHpPJ1mOwOPi0qF7e9__lfwN6SKDa |
| Cites_doi | 10.1109/MNET.2003.1248658 10.3390/fi11030065 10.2139/ssrn.3143468 10.1016/j.cose.2020.101976 10.3390/s20030804 10.1007/s13235-022-00430-6 10.1109/TCNS.2015.2426755 10.1016/j.jmaa.2017.01.002 10.1109/TNET.2008.925623 10.1109/TDSC.2022.3158690 10.1007/s11235-019-00599-z 10.1016/j.cose.2023.103696 10.1016/j.cose.2013.10.001 10.1016/j.compeleceng.2021.106990 10.1109/MC.2017.201 10.1080/23311916.2018.1502242 10.1109/TII.2019.2917912 10.1109/COMST.2021.3105741 10.1007/s41635-020-00105-x 10.1016/j.comcom.2021.11.014 10.1007/s43538-022-00126-w 10.1109/TDSC.2021.3055559 10.1145/3556973 10.1016/j.jnca.2019.01.006 10.1109/ACCESS.2024.3513461 10.1007/s12046-019-1228-4 10.1109/TCNS.2017.2747840 |
| ContentType | Journal Article |
| Copyright | 2025 The Author(s) |
| Copyright_xml | – notice: 2025 The Author(s) |
| DBID | 6I. AAFTH AAYXX CITATION ADTOC UNPAY DOA |
| DOI | 10.1016/j.array.2025.100410 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Open Access Full Text |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2590-0056 |
| ExternalDocumentID | oai_doaj_org_article_f1d9704a07b24f58a2ff707b3c563d7d 10.1016/j.array.2025.100410 10_1016_j_array_2025_100410 S2590005625000372 |
| GroupedDBID | 0R~ 6I. AAEDW AAFTH AALRI AAXUO AAYWO ACVFH ADCNI ADVLN AEUPX AEXQZ AFJKZ AFPUW AIGII AITUG AKBMS AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ APXCP EBS EJD FDB GROUPED_DOAJ M41 M~E OK1 ROL AAYXX CITATION ADTOC UNPAY |
| ID | FETCH-LOGICAL-c366t-ee8543bb49215b5c4783839ef47f1919881211a0ab96f10b8f4ea93280f545623 |
| IEDL.DBID | DOA |
| ISSN | 2590-0056 |
| IngestDate | Fri Oct 03 12:44:21 EDT 2025 Tue Aug 19 23:35:00 EDT 2025 Wed Oct 01 05:51:05 EDT 2025 Sat Jul 19 17:12:02 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Software-defined network Domain Name System Cyber security Game theory Distributed Reflection Denial of Service |
| Language | English |
| License | This is an open access article under the CC BY license. cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c366t-ee8543bb49215b5c4783839ef47f1919881211a0ab96f10b8f4ea93280f545623 |
| ORCID | 0000-0003-1619-7429 0000-0003-3836-1859 0009-0007-6550-5885 |
| OpenAccessLink | https://doaj.org/article/f1d9704a07b24f58a2ff707b3c563d7d |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_f1d9704a07b24f58a2ff707b3c563d7d unpaywall_primary_10_1016_j_array_2025_100410 crossref_primary_10_1016_j_array_2025_100410 elsevier_sciencedirect_doi_10_1016_j_array_2025_100410 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | July 2025 2025-07-00 2025-07-01 |
| PublicationDateYYYYMMDD | 2025-07-01 |
| PublicationDate_xml | – month: 07 year: 2025 text: July 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Array (New York) |
| PublicationYear | 2025 |
| Publisher | Elsevier Inc Elsevier |
| Publisher_xml | – name: Elsevier Inc – name: Elsevier |
| References | Vishwakarma, Jain (b7) 2020; 73 Tsemogne Kamguia (b34) 2023 Tchendji, Mvah, Djamegni, Yankam (b31) 2021; 5 Liatifis, Sarigiannidis, Argyriou, Lagkas (b4) 2023; 55 Puerto, Perea (b36) 2018; 457 Rathore, Bhandari (b3) 2022; 88 Mieghem, Omic, Kooij (b23) 2009; 17 Zhou, Cheng, Jiang, Zhao, Chen (b16) 2020; 97 Du, Wang (b6) 2020; 16 Trajanovski, Hayel, Altman, Wang, Mieghem (b26) 2015; 2 Borm, Tijs, Van Den Aarssen (b39) 1988; 60 Schmid (b1) 2021; 23 Bienkowski (b8) 2019 Govindaraj, Sundan, Thangasamy (b22) 2021 Sun, Ji, Weng, Zhao (b19) 2020 Kumar, Bhuyan (b10) 2019; 44 Priyadarsini, Bera, Das, Rahman (b21) 2023; 20 Tsemogne, Hayel, Kamhoua, Deugoue (b11) 2022; 12 Mvah, Tchendji, Djamégni, Anwar, Tosh, Kamhoua (b13) 2024; 139 Anagnostopoulos, Kambourakis, Kopanos, Louloudakis, Gritzalis (b2) 2013; 39 Mazumdar, Jordan, Sastry (b37) 2019 He, Wang, Cui, Li, Zhou, Zhou, Xiang, Jin, Yang (b18) 2022; 19 Cabaj, Wytrebowicz, Kuklinski, Radziszewski, Dinh (b5) 2014; vol. 3 Chen, Gordon, Kirsten (b20) 2024 Li, Shi, Feng (b15) 2019; 11 Demetres, Manos, Antonis, Markatos, Dovrolis (b33) 2006 Lozovanu, Solomon, Zelikovsky (b38) 2005; 49 Girdler, Vassilakis (b29) 2021; 90 Askar, Keti (b9) 2021 Trajanovski, Kuipers, Hayel, Altman, Mieghem (b27) 2018; 5 Gunantara (b35) 2018; 5 Chen, Wang, Li, Guo, Geng (b28) 2020; 20 Wan, Coffman (b17) 2021 Liu, Quan, Cheng, Zhang, Yu (b14) 2019; 130 Yungaicela-Naula, Vargas-Rosales, Pérez-Díaz, Zareei (b30) 2022; 183 Prasad, Dovrolis, Murray, Claffy (b32) 2003; 17 Erdos, Rényi (b40) 1960; 5 Melo (b25) 2018 Nguemkam, Anwar, Tchendji, Tosh, Kamhoua (b12) 2024; 12 Kolias, Kambourakis, Stavrou, Voas (b24) 2017; 50 Yungaicela-Naula (10.1016/j.array.2025.100410_b30) 2022; 183 Cabaj (10.1016/j.array.2025.100410_b5) 2014; vol. 3 Bienkowski (10.1016/j.array.2025.100410_b8) 2019 Vishwakarma (10.1016/j.array.2025.100410_b7) 2020; 73 He (10.1016/j.array.2025.100410_b18) 2022; 19 Kolias (10.1016/j.array.2025.100410_b24) 2017; 50 Gunantara (10.1016/j.array.2025.100410_b35) 2018; 5 Puerto (10.1016/j.array.2025.100410_b36) 2018; 457 Trajanovski (10.1016/j.array.2025.100410_b27) 2018; 5 Askar (10.1016/j.array.2025.100410_b9) 2021 Chen (10.1016/j.array.2025.100410_b20) 2024 Prasad (10.1016/j.array.2025.100410_b32) 2003; 17 Govindaraj (10.1016/j.array.2025.100410_b22) 2021 Zhou (10.1016/j.array.2025.100410_b16) 2020; 97 Mieghem (10.1016/j.array.2025.100410_b23) 2009; 17 Tchendji (10.1016/j.array.2025.100410_b31) 2021; 5 Sun (10.1016/j.array.2025.100410_b19) 2020 Du (10.1016/j.array.2025.100410_b6) 2020; 16 Tsemogne Kamguia (10.1016/j.array.2025.100410_b34) 2023 Girdler (10.1016/j.array.2025.100410_b29) 2021; 90 Lozovanu (10.1016/j.array.2025.100410_b38) 2005; 49 Borm (10.1016/j.array.2025.100410_b39) 1988; 60 Li (10.1016/j.array.2025.100410_b15) 2019; 11 Anagnostopoulos (10.1016/j.array.2025.100410_b2) 2013; 39 Trajanovski (10.1016/j.array.2025.100410_b26) 2015; 2 Schmid (10.1016/j.array.2025.100410_b1) 2021; 23 Rathore (10.1016/j.array.2025.100410_b3) 2022; 88 Demetres (10.1016/j.array.2025.100410_b33) 2006 Erdos (10.1016/j.array.2025.100410_b40) 1960; 5 Mvah (10.1016/j.array.2025.100410_b13) 2024; 139 Liatifis (10.1016/j.array.2025.100410_b4) 2023; 55 Chen (10.1016/j.array.2025.100410_b28) 2020; 20 Nguemkam (10.1016/j.array.2025.100410_b12) 2024; 12 Melo (10.1016/j.array.2025.100410_b25) 2018 Priyadarsini (10.1016/j.array.2025.100410_b21) 2023; 20 Mazumdar (10.1016/j.array.2025.100410_b37) 2019 Wan (10.1016/j.array.2025.100410_b17) 2021 Tsemogne (10.1016/j.array.2025.100410_b11) 2022; 12 Liu (10.1016/j.array.2025.100410_b14) 2019; 130 Kumar (10.1016/j.array.2025.100410_b10) 2019; 44 |
| References_xml | – year: 2021 ident: b9 article-title: Performance evaluation of different SDN controllers: a review – volume: 5 start-page: 17 year: 1960 end-page: 60 ident: b40 article-title: On the evolution of random graphs publication-title: Publ Math Inst Hung Acad Sci – volume: 11 start-page: 65 year: 2019 ident: b15 article-title: A game-theoretic analysis for distributed honeypots publication-title: Futur Internet – volume: 183 start-page: 64 year: 2022 end-page: 82 ident: b30 article-title: Towards security automation in software defined networks publication-title: Comput Commun – volume: 60 start-page: 303 year: 1988 end-page: 312 ident: b39 article-title: Pareto equilibria in multiobjective games publication-title: Methods Oper Res – volume: 16 start-page: 648 year: 2020 end-page: 657 ident: b6 article-title: An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial internet of things publication-title: IEEE Trans Ind Informatics – year: 2019 ident: b37 article-title: On finding local nash equilibria (and only local nash equilibria) in zero-sum games – volume: 88 start-page: 634 year: 2022 end-page: 650 ident: b3 article-title: Review of game theory approaches for DDoS mitigation by SDN publication-title: Proc Indian Nat Sci Acad – volume: 457 start-page: 1634 year: 2018 end-page: 1648 ident: b36 article-title: On minimax and Pareto optimal security payoffs in multicriteria games publication-title: J Math Anal Appl – volume: 23 start-page: 2429 year: 2021 end-page: 2459 ident: b1 article-title: Thirty years of DNS insecurity: Current issues and perspectives publication-title: IEEE Commun Surv Tutorials – year: 2023 ident: b34 article-title: Game theory for cyber deception against network SIR epidemics – volume: 5 year: 2018 ident: b35 article-title: A review of multi-objective optimization: Methods and its applications publication-title: Cogent Eng – volume: 97 year: 2020 ident: b16 article-title: Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes publication-title: Comput Secur – volume: 12 start-page: 187444 year: 2024 end-page: 187455 ident: b12 article-title: Optimal honeypot allocation using core attack graph in partially observable stochastic games publication-title: IEEE Access – volume: 17 start-page: 1 year: 2009 end-page: 14 ident: b23 article-title: Virus spread in networks publication-title: IEEE/ ACM Trans Netw – volume: 5 start-page: 58 year: 2021 end-page: 74 ident: b31 article-title: E2BaSeP: Efficient bayes based security protocol against ARP spoofing attacks in SDN architectures publication-title: J Hardw Syst Secur – volume: 17 start-page: 27 year: 2003 end-page: 35 ident: b32 article-title: Bandwidth estimation: metrics, measurement techniques, and tools publication-title: IEEE Netw – volume: 19 start-page: 2333 year: 2022 end-page: 2348 ident: b18 article-title: A game-theoretical approach for mitigating edge DDoS attack publication-title: IEEE Trans Dependable Secur Comput – start-page: 319 year: 2021 end-page: 324 ident: b22 article-title: An intrusion detection and prevention system for ddos attacks using a 2-player bayesian game theoretic approach publication-title: 2021 4th international conference on computing and communications technologies – start-page: 1:1 year: 2021 end-page: 1:10 ident: b17 article-title: Game-theoretic modeling of DDoS attacks in cloud computing publication-title: UCC ’21: 2021 IEEE/ACM 14th international conference on utility and cloud computing, leicester, United kingdom, December 6–9, 2021 – year: 2018 ident: b25 article-title: A variational approach to network games publication-title: SSRN Electron J – volume: 20 start-page: 804 year: 2020 ident: b28 article-title: A stackelberg security game for adversarial outbreak detection in the Internet of Things publication-title: Sensors – volume: 90 year: 2021 ident: b29 article-title: Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses publication-title: Comput Electr Eng – volume: 20 start-page: 1500 year: 2023 end-page: 1515 ident: b21 article-title: A security enforcement framework for SDN controller using game theoretic approach publication-title: IEEE Trans Dependable Secur Comput – volume: 2 start-page: 406 year: 2015 end-page: 419 ident: b26 article-title: Decentralized protection strategies against SIS epidemics in networks publication-title: IEEE Trans Control Netw Syst – volume: 73 start-page: 3 year: 2020 end-page: 25 ident: b7 article-title: A survey of DDoS attacking techniques and defence mechanisms in the IoT network publication-title: Telecommun Syst – year: 2024 ident: b20 article-title: Nash equilibrium: How it works in game theory – volume: 39 start-page: 475 year: 2013 end-page: 485 ident: b2 article-title: DNS amplification attack revisited publication-title: Comput Secur – volume: 130 start-page: 1 year: 2019 end-page: 13 ident: b14 article-title: Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things publication-title: J Netw Comput Appl – year: 2019 ident: b8 article-title: What is a volumetric attack? – volume: 50 start-page: 80 year: 2017 end-page: 84 ident: b24 article-title: DDoS in the IoT: Mirai and other botnets publication-title: Computer – start-page: 61 year: 2006 end-page: 70 ident: b33 article-title: Available bandwidth measurement as simple as running wget publication-title: Proc. of PAM – volume: 44 start-page: 245 year: 2019 ident: b10 article-title: Using game theory to model DoS attack and defence publication-title: SĀdhanĀ – volume: vol. 3 start-page: 143 year: 2014 end-page: 148 ident: b5 article-title: SDN architecture impact on network security publication-title: Position papers of the 2014 federated conference on computer science and information systems, fedCSIS 2014, warsaw, Poland, September 7-10, 2014 – volume: 12 start-page: 82 year: 2022 end-page: 109 ident: b11 article-title: A partially observable stochastic zero-sum game for a network epidemic control problem publication-title: Dyn Games Appl – volume: 49 start-page: 115 year: 2005 end-page: 122 ident: b38 article-title: Multiobjective games and determining pareto-nash equilibria publication-title: Bul Acad de c Stiin c Te A Mold Mat – start-page: 02012 year: 2020 ident: b19 article-title: Overview on MTD technology based on game theory publication-title: MATEC web of conferences, vol. 309 – volume: 5 start-page: 1682 year: 2018 end-page: 1692 ident: b27 article-title: Designing virus-resistant, high-performance networks: A game-formation approach publication-title: IEEE Trans Control Netw Syst – volume: 55 start-page: 186:1 year: 2023 end-page: 186:37 ident: b4 article-title: Advancing SDN from OpenFlow to P4: A survey publication-title: ACM Comput Surv – volume: 139 year: 2024 ident: b13 article-title: Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach publication-title: Comput Secur – year: 2023 ident: 10.1016/j.array.2025.100410_b34 – volume: 60 start-page: 303 year: 1988 ident: 10.1016/j.array.2025.100410_b39 article-title: Pareto equilibria in multiobjective games publication-title: Methods Oper Res – volume: vol. 3 start-page: 143 year: 2014 ident: 10.1016/j.array.2025.100410_b5 article-title: SDN architecture impact on network security – volume: 17 start-page: 27 issue: 6 year: 2003 ident: 10.1016/j.array.2025.100410_b32 article-title: Bandwidth estimation: metrics, measurement techniques, and tools publication-title: IEEE Netw doi: 10.1109/MNET.2003.1248658 – volume: 11 start-page: 65 issue: 3 year: 2019 ident: 10.1016/j.array.2025.100410_b15 article-title: A game-theoretic analysis for distributed honeypots publication-title: Futur Internet doi: 10.3390/fi11030065 – start-page: 1:1 year: 2021 ident: 10.1016/j.array.2025.100410_b17 article-title: Game-theoretic modeling of DDoS attacks in cloud computing – start-page: 319 year: 2021 ident: 10.1016/j.array.2025.100410_b22 article-title: An intrusion detection and prevention system for ddos attacks using a 2-player bayesian game theoretic approach – year: 2018 ident: 10.1016/j.array.2025.100410_b25 article-title: A variational approach to network games publication-title: SSRN Electron J doi: 10.2139/ssrn.3143468 – volume: 97 year: 2020 ident: 10.1016/j.array.2025.100410_b16 article-title: Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes publication-title: Comput Secur doi: 10.1016/j.cose.2020.101976 – volume: 20 start-page: 804 issue: 3 year: 2020 ident: 10.1016/j.array.2025.100410_b28 article-title: A stackelberg security game for adversarial outbreak detection in the Internet of Things publication-title: Sensors doi: 10.3390/s20030804 – volume: 49 start-page: 115 issue: 3 year: 2005 ident: 10.1016/j.array.2025.100410_b38 article-title: Multiobjective games and determining pareto-nash equilibria publication-title: Bul Acad de c Stiin c Te A Mold Mat – year: 2019 ident: 10.1016/j.array.2025.100410_b37 – volume: 12 start-page: 82 issue: 1 year: 2022 ident: 10.1016/j.array.2025.100410_b11 article-title: A partially observable stochastic zero-sum game for a network epidemic control problem publication-title: Dyn Games Appl doi: 10.1007/s13235-022-00430-6 – volume: 2 start-page: 406 issue: 4 year: 2015 ident: 10.1016/j.array.2025.100410_b26 article-title: Decentralized protection strategies against SIS epidemics in networks publication-title: IEEE Trans Control Netw Syst doi: 10.1109/TCNS.2015.2426755 – start-page: 61 year: 2006 ident: 10.1016/j.array.2025.100410_b33 article-title: Available bandwidth measurement as simple as running wget – volume: 457 start-page: 1634 issue: 2 year: 2018 ident: 10.1016/j.array.2025.100410_b36 article-title: On minimax and Pareto optimal security payoffs in multicriteria games publication-title: J Math Anal Appl doi: 10.1016/j.jmaa.2017.01.002 – volume: 17 start-page: 1 issue: 1 year: 2009 ident: 10.1016/j.array.2025.100410_b23 article-title: Virus spread in networks publication-title: IEEE/ ACM Trans Netw doi: 10.1109/TNET.2008.925623 – volume: 20 start-page: 1500 issue: 2 year: 2023 ident: 10.1016/j.array.2025.100410_b21 article-title: A security enforcement framework for SDN controller using game theoretic approach publication-title: IEEE Trans Dependable Secur Comput doi: 10.1109/TDSC.2022.3158690 – year: 2021 ident: 10.1016/j.array.2025.100410_b9 – volume: 73 start-page: 3 issue: 1 year: 2020 ident: 10.1016/j.array.2025.100410_b7 article-title: A survey of DDoS attacking techniques and defence mechanisms in the IoT network publication-title: Telecommun Syst doi: 10.1007/s11235-019-00599-z – volume: 139 year: 2024 ident: 10.1016/j.array.2025.100410_b13 article-title: Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach publication-title: Comput Secur doi: 10.1016/j.cose.2023.103696 – volume: 39 start-page: 475 year: 2013 ident: 10.1016/j.array.2025.100410_b2 article-title: DNS amplification attack revisited publication-title: Comput Secur doi: 10.1016/j.cose.2013.10.001 – volume: 90 year: 2021 ident: 10.1016/j.array.2025.100410_b29 article-title: Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses publication-title: Comput Electr Eng doi: 10.1016/j.compeleceng.2021.106990 – volume: 50 start-page: 80 issue: 7 year: 2017 ident: 10.1016/j.array.2025.100410_b24 article-title: DDoS in the IoT: Mirai and other botnets publication-title: Computer doi: 10.1109/MC.2017.201 – volume: 5 issue: 1 year: 2018 ident: 10.1016/j.array.2025.100410_b35 article-title: A review of multi-objective optimization: Methods and its applications publication-title: Cogent Eng doi: 10.1080/23311916.2018.1502242 – volume: 16 start-page: 648 issue: 1 year: 2020 ident: 10.1016/j.array.2025.100410_b6 article-title: An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial internet of things publication-title: IEEE Trans Ind Informatics doi: 10.1109/TII.2019.2917912 – volume: 23 start-page: 2429 issue: 4 year: 2021 ident: 10.1016/j.array.2025.100410_b1 article-title: Thirty years of DNS insecurity: Current issues and perspectives publication-title: IEEE Commun Surv Tutorials doi: 10.1109/COMST.2021.3105741 – volume: 5 start-page: 58 year: 2021 ident: 10.1016/j.array.2025.100410_b31 article-title: E2BaSeP: Efficient bayes based security protocol against ARP spoofing attacks in SDN architectures publication-title: J Hardw Syst Secur doi: 10.1007/s41635-020-00105-x – volume: 183 start-page: 64 year: 2022 ident: 10.1016/j.array.2025.100410_b30 article-title: Towards security automation in software defined networks publication-title: Comput Commun doi: 10.1016/j.comcom.2021.11.014 – year: 2019 ident: 10.1016/j.array.2025.100410_b8 – volume: 88 start-page: 634 issue: 4 year: 2022 ident: 10.1016/j.array.2025.100410_b3 article-title: Review of game theory approaches for DDoS mitigation by SDN publication-title: Proc Indian Nat Sci Acad doi: 10.1007/s43538-022-00126-w – volume: 19 start-page: 2333 issue: 4 year: 2022 ident: 10.1016/j.array.2025.100410_b18 article-title: A game-theoretical approach for mitigating edge DDoS attack publication-title: IEEE Trans Dependable Secur Comput doi: 10.1109/TDSC.2021.3055559 – start-page: 02012 year: 2020 ident: 10.1016/j.array.2025.100410_b19 article-title: Overview on MTD technology based on game theory – volume: 5 start-page: 17 issue: 1 year: 1960 ident: 10.1016/j.array.2025.100410_b40 article-title: On the evolution of random graphs publication-title: Publ Math Inst Hung Acad Sci – volume: 55 start-page: 186:1 issue: 9 year: 2023 ident: 10.1016/j.array.2025.100410_b4 article-title: Advancing SDN from OpenFlow to P4: A survey publication-title: ACM Comput Surv doi: 10.1145/3556973 – volume: 130 start-page: 1 year: 2019 ident: 10.1016/j.array.2025.100410_b14 article-title: Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2019.01.006 – volume: 12 start-page: 187444 year: 2024 ident: 10.1016/j.array.2025.100410_b12 article-title: Optimal honeypot allocation using core attack graph in partially observable stochastic games publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3513461 – year: 2024 ident: 10.1016/j.array.2025.100410_b20 – volume: 44 start-page: 245 issue: 12 year: 2019 ident: 10.1016/j.array.2025.100410_b10 article-title: Using game theory to model DoS attack and defence publication-title: SĀdhanĀ doi: 10.1007/s12046-019-1228-4 – volume: 5 start-page: 1682 issue: 4 year: 2018 ident: 10.1016/j.array.2025.100410_b27 article-title: Designing virus-resistant, high-performance networks: A game-formation approach publication-title: IEEE Trans Control Netw Syst doi: 10.1109/TCNS.2017.2747840 |
| SSID | ssj0002511158 |
| Score | 2.298563 |
| Snippet | Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits... |
| SourceID | doaj unpaywall crossref elsevier |
| SourceType | Open Website Open Access Repository Index Database Publisher |
| StartPage | 100410 |
| SubjectTerms | Cyber security Distributed Reflection Denial of Service Domain Name System Game theory Software-defined network |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT9swELdQ-7CnMQbTigbywx5nlCa2kzwCBaFJQ9OgEjxF5y9WKGlVUiH467nLB1oRmuAxkZ1Y57Pvd7q73zH23SUuHcapFWC1E9JYJwhWC5d4ChPl2mmqHf51qk_G8ueFumh5tqkWZiV-X-dhwWIBD-jIxYoi-pLKqfpaIfDusf749Pf-JbWPUznVRyvd8Qq9PnPF9tQU_Ssm6MOynMPDPUyn_5iY4_WmdvuuZiakzJKbvWVl9uzjC97GN67-E_vYQk2-3-jGBlvz5We23rVx4O2p3mR_6yJcMTPXzeXHr-DWcwSzPJDnjraNwxVMEEfyEdHsUocs7_gfH6Z1HlfJR7MzDlVF5fp8UvI7vNrvYeGF8wFBrONlk2u-xcbHR-eHJ6JtwCBsonUlvM-UTIyROQIDo6xMM3Rocx9kGtDPy7OMCOIgApPrMIxMFqQHBIRZFAiYxckX1itnpf_KuHVRSIGipIjQtPUQvEao4kwELoJYDdiPbmuKecOzUXQJaNdFLcWCpFg0UhywA9q-56FEkl2_QOkX7ZkrwtDlaSQhSk0sg8ogDiHFh8QqjSrqBkx3m1-0eKPBEfipyf__Lp5V5S2r3X7n-G-sVy2WfgfhTmV2WzV_AoX-_So priority: 102 providerName: Unpaywall |
| Title | Multi-objective game for fighting against Distributed Reflection DoS attacks in software-defined network |
| URI | https://dx.doi.org/10.1016/j.array.2025.100410 https://doi.org/10.1016/j.array.2025.100410 https://doaj.org/article/f1d9704a07b24f58a2ff707b3c563d7d |
| UnpaywallVersion | publishedVersion |
| Volume | 26 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2590-0056 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002511158 issn: 2590-0056 databaseCode: DOA dateStart: 20190101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2590-0056 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002511158 issn: 2590-0056 databaseCode: M~E dateStart: 20190101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUQHOiFr7ZiaUE-cMTCmziOc4QCQkggBF0JTtE4tumibRZtgxCX_nZm4gQtF9oDl0iJIns0k8y8kd_MMLbrUpcPk7wSUGknlK2cIFgtXOrpmKjQTlPt8PmFPh2ps5vsZm7UF3HCYnvgqLj9MHRFLhXI3CYqZAaSEHK8SatM4z6OvK80xVwyRT6YgPMwM32boZbQBbMZPGNGmGREDVBUMzsXitqO_W8i0vJj_QDPTzCZzEWckzW20kFFfhBFXGcLvt5gq_0YBt79lZ_Zr7aIVkztfXRe_A5-e45glAfKvDE2cbiDMeJAfkRtcmnClXf8yodJy8Oq-dH0mkPTULk9H9f8D7rmJ5h54XxAEOp4HbniX9jo5Pjnj1PRDVAQVap1I7w3mUqtVQUGdptVKjeYkBY-qDxgnlYYQw3eQIItdBhKa4LygIDOyEDAKkm_ssV6WvtNxisnQw50yokIS1cegtcINZyV4CQk2YDt9bosH2KfjLInkN2XrepLUn0ZVT9gh6Tv11epyXX7AE1fdqYv_2X6AdO9tcoOL0QcgEuN399dvNr2f6Td-ghpv7FPtGSk-n5ni83s0W8joGnsTvvt4vX87_EOWxpdXB7cvgAvWPZ6 |
| linkProvider | Directory of Open Access Journals |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT9swELdQ-7CnMQbTigbywx5nlCa2kzwCBaFJQ9OgEjxF5y9WKGlVUiH467nLB1oRmuAxkZ1Y57Pvd7q73zH23SUuHcapFWC1E9JYJwhWC5d4ChPl2mmqHf51qk_G8ueFumh5tqkWZiV-X-dhwWIBD-jIxYoi-pLKqfpaIfDusf749Pf-JbWPUznVRyvd8Qq9PnPF9tQU_Ssm6MOynMPDPUyn_5iY4_WmdvuuZiakzJKbvWVl9uzjC97GN67-E_vYQk2-3-jGBlvz5We23rVx4O2p3mR_6yJcMTPXzeXHr-DWcwSzPJDnjraNwxVMEEfyEdHsUocs7_gfH6Z1HlfJR7MzDlVF5fp8UvI7vNrvYeGF8wFBrONlk2u-xcbHR-eHJ6JtwCBsonUlvM-UTIyROQIDo6xMM3Rocx9kGtDPy7OMCOIgApPrMIxMFqQHBIRZFAiYxckX1itnpf_KuHVRSIGipIjQtPUQvEao4kwELoJYDdiPbmuKecOzUXQJaNdFLcWCpFg0UhywA9q-56FEkl2_QOkX7ZkrwtDlaSQhSk0sg8ogDiHFh8QqjSrqBkx3m1-0eKPBEfipyf__Lp5V5S2r3X7n-G-sVy2WfgfhTmV2WzV_AoX-_So |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi-objective+game+for+fighting+against+Distributed+Reflection+DoS+attacks+in+software-defined+network&rft.jtitle=Array+%28New+York%29&rft.au=Kengne+Tchendji%2C+Vianney&rft.au=Velempini%2C+Mthulisi&rft.au=Chassem+Kamdem%2C+Priva&rft.date=2025-07-01&rft.pub=Elsevier+Inc&rft.issn=2590-0056&rft.eissn=2590-0056&rft.volume=26&rft_id=info:doi/10.1016%2Fj.array.2025.100410&rft.externalDocID=S2590005625000372 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2590-0056&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2590-0056&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2590-0056&client=summon |