Multi-objective game for fighting against Distributed Reflection DoS attacks in software-defined network

Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits vulnerabilities in existing protocols by using a botnet to send forged query packets to more than one device which are used as reflectors. As a resul...

Full description

Saved in:
Bibliographic Details
Published inArray (New York) Vol. 26; p. 100410
Main Authors Kengne Tchendji, Vianney, Velempini, Mthulisi, Chassem Kamdem, Priva
Format Journal Article
LanguageEnglish
Published Elsevier Inc 01.07.2025
Elsevier
Subjects
Online AccessGet full text
ISSN2590-0056
2590-0056
DOI10.1016/j.array.2025.100410

Cover

Abstract Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits vulnerabilities in existing protocols by using a botnet to send forged query packets to more than one device which are used as reflectors. As a result, a stream of replies is sent to a victim node or subnet which overwhelms it. Several security measures have been proposed to counter such attacks, unfortunately, most of them do not consider the attacker’s dynamics. Furthermore, limiting the growth of the botnet could significantly reduce the impact of such an attack. In this paper, we leverage the advantages of software-defined networks (SDN) to propose a game-theoretic approach that predicts the defender’s best moves based on Nash strategies to mitigate this attack while avoiding botnet expansion. This approach is a non-cooperative multi-objective game between the attacker which aims to (1) compromise more nodes to scale the volume of its attack, (2) launch a volumetric-based DrDoS in the network, and the defender which aims to avoid it. This game results in a mixed-strategy Pareto-Nash equilibrium. It includes a player utility-based algorithm to detect malicious flows (or nodes) and drop them (or patch them). The results of the Matlab simulation show that the proposed model is an effective means of mitigating DrDoS attacks. To the best of our knowledge, this study is the first attempt to design a defense system based on multi-objective game to counter the effects of DrDoS in SDN.
AbstractList Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits vulnerabilities in existing protocols by using a botnet to send forged query packets to more than one device which are used as reflectors. As a result, a stream of replies is sent to a victim node or subnet which overwhelms it. Several security measures have been proposed to counter such attacks, unfortunately, most of them do not consider the attacker’s dynamics. Furthermore, limiting the growth of the botnet could significantly reduce the impact of such an attack. In this paper, we leverage the advantages of software-defined networks (SDN) to propose a game-theoretic approach that predicts the defender’s best moves based on Nash strategies to mitigate this attack while avoiding botnet expansion. This approach is a non-cooperative multi-objective game between the attacker which aims to (1) compromise more nodes to scale the volume of its attack, (2) launch a volumetric-based DrDoS in the network, and the defender which aims to avoid it. This game results in a mixed-strategy Pareto-Nash equilibrium. It includes a player utility-based algorithm to detect malicious flows (or nodes) and drop them (or patch them). The results of the Matlab simulation show that the proposed model is an effective means of mitigating DrDoS attacks. To the best of our knowledge, this study is the first attempt to design a defense system based on multi-objective game to counter the effects of DrDoS in SDN.
ArticleNumber 100410
Author Chassem Kamdem, Priva
Kengne Tchendji, Vianney
Velempini, Mthulisi
Author_xml – sequence: 1
  givenname: Vianney
  orcidid: 0000-0003-3836-1859
  surname: Kengne Tchendji
  fullname: Kengne Tchendji, Vianney
  email: vianney.kengnetchendji@ul.ac.za, vianneykengne@yahoo.fr
  organization: Department of Computer Science, University of Limpopo, Mankweng, PO Box 0727, South Africa
– sequence: 2
  givenname: Mthulisi
  orcidid: 0000-0003-1619-7429
  surname: Velempini
  fullname: Velempini, Mthulisi
  email: mthulisi.velempini@ul.ac.za
  organization: Department of Computer Science, University of Limpopo, Mankweng, PO Box 0727, South Africa
– sequence: 3
  givenname: Priva
  orcidid: 0009-0007-6550-5885
  surname: Chassem Kamdem
  fullname: Chassem Kamdem, Priva
  email: priva.chassem@univ-dschang.org
  organization: Department of Mathematics and Computer Science, University of Dschang, Dschang, PO Box 67, Cameroon
BookMark eNqNkMtq3TAQhkVJoWmaJ-hGL-BTyZJsedFFSdo0kBLIZS3G8siR40hB0snhvH194lK6KlnNhfl-hu8jOQoxICGfOdtwxpsv0wZSgv2mZrVaNkxy9o4c16pjFWOqOfqn_0BOc54YWy4550ofk4df27n4KvYT2uJfkI7whNTFRJ0fH4oPI4URfMiFnvtcku-3BQd6g24-ADHQ83hLoRSwj5n6QHN0ZQcJqwGdD8tpwLKL6fETee9gznj6p56Q-x_f785-VlfXF5dn364qK5qmVIhaSdH3squ56pWVrRZadOhk63jHO615zTkw6LvGcdZrJxE6UWvmlFRNLU7I5Zo7RJjMc_JPkPYmgjevi5hGA6l4O6NxfOhaJoG1fS2d0lA71y6DsKoRQzssWXLN2oZn2O9gnv8GcmYO8s1kXuWbg3yzyl8wsWI2xZwTujdSX1cKFzsvHpPJ1mOwOPi0qF7e9__lfwN6SKDa
Cites_doi 10.1109/MNET.2003.1248658
10.3390/fi11030065
10.2139/ssrn.3143468
10.1016/j.cose.2020.101976
10.3390/s20030804
10.1007/s13235-022-00430-6
10.1109/TCNS.2015.2426755
10.1016/j.jmaa.2017.01.002
10.1109/TNET.2008.925623
10.1109/TDSC.2022.3158690
10.1007/s11235-019-00599-z
10.1016/j.cose.2023.103696
10.1016/j.cose.2013.10.001
10.1016/j.compeleceng.2021.106990
10.1109/MC.2017.201
10.1080/23311916.2018.1502242
10.1109/TII.2019.2917912
10.1109/COMST.2021.3105741
10.1007/s41635-020-00105-x
10.1016/j.comcom.2021.11.014
10.1007/s43538-022-00126-w
10.1109/TDSC.2021.3055559
10.1145/3556973
10.1016/j.jnca.2019.01.006
10.1109/ACCESS.2024.3513461
10.1007/s12046-019-1228-4
10.1109/TCNS.2017.2747840
ContentType Journal Article
Copyright 2025 The Author(s)
Copyright_xml – notice: 2025 The Author(s)
DBID 6I.
AAFTH
AAYXX
CITATION
ADTOC
UNPAY
DOA
DOI 10.1016/j.array.2025.100410
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Open Access Full Text
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2590-0056
ExternalDocumentID oai_doaj_org_article_f1d9704a07b24f58a2ff707b3c563d7d
10.1016/j.array.2025.100410
10_1016_j_array_2025_100410
S2590005625000372
GroupedDBID 0R~
6I.
AAEDW
AAFTH
AALRI
AAXUO
AAYWO
ACVFH
ADCNI
ADVLN
AEUPX
AEXQZ
AFJKZ
AFPUW
AIGII
AITUG
AKBMS
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
APXCP
EBS
EJD
FDB
GROUPED_DOAJ
M41
M~E
OK1
ROL
AAYXX
CITATION
ADTOC
UNPAY
ID FETCH-LOGICAL-c366t-ee8543bb49215b5c4783839ef47f1919881211a0ab96f10b8f4ea93280f545623
IEDL.DBID DOA
ISSN 2590-0056
IngestDate Fri Oct 03 12:44:21 EDT 2025
Tue Aug 19 23:35:00 EDT 2025
Wed Oct 01 05:51:05 EDT 2025
Sat Jul 19 17:12:02 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Software-defined network
Domain Name System
Cyber security
Game theory
Distributed Reflection Denial of Service
Language English
License This is an open access article under the CC BY license.
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c366t-ee8543bb49215b5c4783839ef47f1919881211a0ab96f10b8f4ea93280f545623
ORCID 0000-0003-1619-7429
0000-0003-3836-1859
0009-0007-6550-5885
OpenAccessLink https://doaj.org/article/f1d9704a07b24f58a2ff707b3c563d7d
ParticipantIDs doaj_primary_oai_doaj_org_article_f1d9704a07b24f58a2ff707b3c563d7d
unpaywall_primary_10_1016_j_array_2025_100410
crossref_primary_10_1016_j_array_2025_100410
elsevier_sciencedirect_doi_10_1016_j_array_2025_100410
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate July 2025
2025-07-00
2025-07-01
PublicationDateYYYYMMDD 2025-07-01
PublicationDate_xml – month: 07
  year: 2025
  text: July 2025
PublicationDecade 2020
PublicationTitle Array (New York)
PublicationYear 2025
Publisher Elsevier Inc
Elsevier
Publisher_xml – name: Elsevier Inc
– name: Elsevier
References Vishwakarma, Jain (b7) 2020; 73
Tsemogne Kamguia (b34) 2023
Tchendji, Mvah, Djamegni, Yankam (b31) 2021; 5
Liatifis, Sarigiannidis, Argyriou, Lagkas (b4) 2023; 55
Puerto, Perea (b36) 2018; 457
Rathore, Bhandari (b3) 2022; 88
Mieghem, Omic, Kooij (b23) 2009; 17
Zhou, Cheng, Jiang, Zhao, Chen (b16) 2020; 97
Du, Wang (b6) 2020; 16
Trajanovski, Hayel, Altman, Wang, Mieghem (b26) 2015; 2
Borm, Tijs, Van Den Aarssen (b39) 1988; 60
Schmid (b1) 2021; 23
Bienkowski (b8) 2019
Govindaraj, Sundan, Thangasamy (b22) 2021
Sun, Ji, Weng, Zhao (b19) 2020
Kumar, Bhuyan (b10) 2019; 44
Priyadarsini, Bera, Das, Rahman (b21) 2023; 20
Tsemogne, Hayel, Kamhoua, Deugoue (b11) 2022; 12
Mvah, Tchendji, Djamégni, Anwar, Tosh, Kamhoua (b13) 2024; 139
Anagnostopoulos, Kambourakis, Kopanos, Louloudakis, Gritzalis (b2) 2013; 39
Mazumdar, Jordan, Sastry (b37) 2019
He, Wang, Cui, Li, Zhou, Zhou, Xiang, Jin, Yang (b18) 2022; 19
Cabaj, Wytrebowicz, Kuklinski, Radziszewski, Dinh (b5) 2014; vol. 3
Chen, Gordon, Kirsten (b20) 2024
Li, Shi, Feng (b15) 2019; 11
Demetres, Manos, Antonis, Markatos, Dovrolis (b33) 2006
Lozovanu, Solomon, Zelikovsky (b38) 2005; 49
Girdler, Vassilakis (b29) 2021; 90
Askar, Keti (b9) 2021
Trajanovski, Kuipers, Hayel, Altman, Mieghem (b27) 2018; 5
Gunantara (b35) 2018; 5
Chen, Wang, Li, Guo, Geng (b28) 2020; 20
Wan, Coffman (b17) 2021
Liu, Quan, Cheng, Zhang, Yu (b14) 2019; 130
Yungaicela-Naula, Vargas-Rosales, Pérez-Díaz, Zareei (b30) 2022; 183
Prasad, Dovrolis, Murray, Claffy (b32) 2003; 17
Erdos, Rényi (b40) 1960; 5
Melo (b25) 2018
Nguemkam, Anwar, Tchendji, Tosh, Kamhoua (b12) 2024; 12
Kolias, Kambourakis, Stavrou, Voas (b24) 2017; 50
Yungaicela-Naula (10.1016/j.array.2025.100410_b30) 2022; 183
Cabaj (10.1016/j.array.2025.100410_b5) 2014; vol. 3
Bienkowski (10.1016/j.array.2025.100410_b8) 2019
Vishwakarma (10.1016/j.array.2025.100410_b7) 2020; 73
He (10.1016/j.array.2025.100410_b18) 2022; 19
Kolias (10.1016/j.array.2025.100410_b24) 2017; 50
Gunantara (10.1016/j.array.2025.100410_b35) 2018; 5
Puerto (10.1016/j.array.2025.100410_b36) 2018; 457
Trajanovski (10.1016/j.array.2025.100410_b27) 2018; 5
Askar (10.1016/j.array.2025.100410_b9) 2021
Chen (10.1016/j.array.2025.100410_b20) 2024
Prasad (10.1016/j.array.2025.100410_b32) 2003; 17
Govindaraj (10.1016/j.array.2025.100410_b22) 2021
Zhou (10.1016/j.array.2025.100410_b16) 2020; 97
Mieghem (10.1016/j.array.2025.100410_b23) 2009; 17
Tchendji (10.1016/j.array.2025.100410_b31) 2021; 5
Sun (10.1016/j.array.2025.100410_b19) 2020
Du (10.1016/j.array.2025.100410_b6) 2020; 16
Tsemogne Kamguia (10.1016/j.array.2025.100410_b34) 2023
Girdler (10.1016/j.array.2025.100410_b29) 2021; 90
Lozovanu (10.1016/j.array.2025.100410_b38) 2005; 49
Borm (10.1016/j.array.2025.100410_b39) 1988; 60
Li (10.1016/j.array.2025.100410_b15) 2019; 11
Anagnostopoulos (10.1016/j.array.2025.100410_b2) 2013; 39
Trajanovski (10.1016/j.array.2025.100410_b26) 2015; 2
Schmid (10.1016/j.array.2025.100410_b1) 2021; 23
Rathore (10.1016/j.array.2025.100410_b3) 2022; 88
Demetres (10.1016/j.array.2025.100410_b33) 2006
Erdos (10.1016/j.array.2025.100410_b40) 1960; 5
Mvah (10.1016/j.array.2025.100410_b13) 2024; 139
Liatifis (10.1016/j.array.2025.100410_b4) 2023; 55
Chen (10.1016/j.array.2025.100410_b28) 2020; 20
Nguemkam (10.1016/j.array.2025.100410_b12) 2024; 12
Melo (10.1016/j.array.2025.100410_b25) 2018
Priyadarsini (10.1016/j.array.2025.100410_b21) 2023; 20
Mazumdar (10.1016/j.array.2025.100410_b37) 2019
Wan (10.1016/j.array.2025.100410_b17) 2021
Tsemogne (10.1016/j.array.2025.100410_b11) 2022; 12
Liu (10.1016/j.array.2025.100410_b14) 2019; 130
Kumar (10.1016/j.array.2025.100410_b10) 2019; 44
References_xml – year: 2021
  ident: b9
  article-title: Performance evaluation of different SDN controllers: a review
– volume: 5
  start-page: 17
  year: 1960
  end-page: 60
  ident: b40
  article-title: On the evolution of random graphs
  publication-title: Publ Math Inst Hung Acad Sci
– volume: 11
  start-page: 65
  year: 2019
  ident: b15
  article-title: A game-theoretic analysis for distributed honeypots
  publication-title: Futur Internet
– volume: 183
  start-page: 64
  year: 2022
  end-page: 82
  ident: b30
  article-title: Towards security automation in software defined networks
  publication-title: Comput Commun
– volume: 60
  start-page: 303
  year: 1988
  end-page: 312
  ident: b39
  article-title: Pareto equilibria in multiobjective games
  publication-title: Methods Oper Res
– volume: 16
  start-page: 648
  year: 2020
  end-page: 657
  ident: b6
  article-title: An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial internet of things
  publication-title: IEEE Trans Ind Informatics
– year: 2019
  ident: b37
  article-title: On finding local nash equilibria (and only local nash equilibria) in zero-sum games
– volume: 88
  start-page: 634
  year: 2022
  end-page: 650
  ident: b3
  article-title: Review of game theory approaches for DDoS mitigation by SDN
  publication-title: Proc Indian Nat Sci Acad
– volume: 457
  start-page: 1634
  year: 2018
  end-page: 1648
  ident: b36
  article-title: On minimax and Pareto optimal security payoffs in multicriteria games
  publication-title: J Math Anal Appl
– volume: 23
  start-page: 2429
  year: 2021
  end-page: 2459
  ident: b1
  article-title: Thirty years of DNS insecurity: Current issues and perspectives
  publication-title: IEEE Commun Surv Tutorials
– year: 2023
  ident: b34
  article-title: Game theory for cyber deception against network SIR epidemics
– volume: 5
  year: 2018
  ident: b35
  article-title: A review of multi-objective optimization: Methods and its applications
  publication-title: Cogent Eng
– volume: 97
  year: 2020
  ident: b16
  article-title: Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes
  publication-title: Comput Secur
– volume: 12
  start-page: 187444
  year: 2024
  end-page: 187455
  ident: b12
  article-title: Optimal honeypot allocation using core attack graph in partially observable stochastic games
  publication-title: IEEE Access
– volume: 17
  start-page: 1
  year: 2009
  end-page: 14
  ident: b23
  article-title: Virus spread in networks
  publication-title: IEEE/ ACM Trans Netw
– volume: 5
  start-page: 58
  year: 2021
  end-page: 74
  ident: b31
  article-title: E2BaSeP: Efficient bayes based security protocol against ARP spoofing attacks in SDN architectures
  publication-title: J Hardw Syst Secur
– volume: 17
  start-page: 27
  year: 2003
  end-page: 35
  ident: b32
  article-title: Bandwidth estimation: metrics, measurement techniques, and tools
  publication-title: IEEE Netw
– volume: 19
  start-page: 2333
  year: 2022
  end-page: 2348
  ident: b18
  article-title: A game-theoretical approach for mitigating edge DDoS attack
  publication-title: IEEE Trans Dependable Secur Comput
– start-page: 319
  year: 2021
  end-page: 324
  ident: b22
  article-title: An intrusion detection and prevention system for ddos attacks using a 2-player bayesian game theoretic approach
  publication-title: 2021 4th international conference on computing and communications technologies
– start-page: 1:1
  year: 2021
  end-page: 1:10
  ident: b17
  article-title: Game-theoretic modeling of DDoS attacks in cloud computing
  publication-title: UCC ’21: 2021 IEEE/ACM 14th international conference on utility and cloud computing, leicester, United kingdom, December 6–9, 2021
– year: 2018
  ident: b25
  article-title: A variational approach to network games
  publication-title: SSRN Electron J
– volume: 20
  start-page: 804
  year: 2020
  ident: b28
  article-title: A stackelberg security game for adversarial outbreak detection in the Internet of Things
  publication-title: Sensors
– volume: 90
  year: 2021
  ident: b29
  article-title: Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses
  publication-title: Comput Electr Eng
– volume: 20
  start-page: 1500
  year: 2023
  end-page: 1515
  ident: b21
  article-title: A security enforcement framework for SDN controller using game theoretic approach
  publication-title: IEEE Trans Dependable Secur Comput
– volume: 2
  start-page: 406
  year: 2015
  end-page: 419
  ident: b26
  article-title: Decentralized protection strategies against SIS epidemics in networks
  publication-title: IEEE Trans Control Netw Syst
– volume: 73
  start-page: 3
  year: 2020
  end-page: 25
  ident: b7
  article-title: A survey of DDoS attacking techniques and defence mechanisms in the IoT network
  publication-title: Telecommun Syst
– year: 2024
  ident: b20
  article-title: Nash equilibrium: How it works in game theory
– volume: 39
  start-page: 475
  year: 2013
  end-page: 485
  ident: b2
  article-title: DNS amplification attack revisited
  publication-title: Comput Secur
– volume: 130
  start-page: 1
  year: 2019
  end-page: 13
  ident: b14
  article-title: Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things
  publication-title: J Netw Comput Appl
– year: 2019
  ident: b8
  article-title: What is a volumetric attack?
– volume: 50
  start-page: 80
  year: 2017
  end-page: 84
  ident: b24
  article-title: DDoS in the IoT: Mirai and other botnets
  publication-title: Computer
– start-page: 61
  year: 2006
  end-page: 70
  ident: b33
  article-title: Available bandwidth measurement as simple as running wget
  publication-title: Proc. of PAM
– volume: 44
  start-page: 245
  year: 2019
  ident: b10
  article-title: Using game theory to model DoS attack and defence
  publication-title: SĀdhanĀ
– volume: vol. 3
  start-page: 143
  year: 2014
  end-page: 148
  ident: b5
  article-title: SDN architecture impact on network security
  publication-title: Position papers of the 2014 federated conference on computer science and information systems, fedCSIS 2014, warsaw, Poland, September 7-10, 2014
– volume: 12
  start-page: 82
  year: 2022
  end-page: 109
  ident: b11
  article-title: A partially observable stochastic zero-sum game for a network epidemic control problem
  publication-title: Dyn Games Appl
– volume: 49
  start-page: 115
  year: 2005
  end-page: 122
  ident: b38
  article-title: Multiobjective games and determining pareto-nash equilibria
  publication-title: Bul Acad de c Stiin c Te A Mold Mat
– start-page: 02012
  year: 2020
  ident: b19
  article-title: Overview on MTD technology based on game theory
  publication-title: MATEC web of conferences, vol. 309
– volume: 5
  start-page: 1682
  year: 2018
  end-page: 1692
  ident: b27
  article-title: Designing virus-resistant, high-performance networks: A game-formation approach
  publication-title: IEEE Trans Control Netw Syst
– volume: 55
  start-page: 186:1
  year: 2023
  end-page: 186:37
  ident: b4
  article-title: Advancing SDN from OpenFlow to P4: A survey
  publication-title: ACM Comput Surv
– volume: 139
  year: 2024
  ident: b13
  article-title: Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach
  publication-title: Comput Secur
– year: 2023
  ident: 10.1016/j.array.2025.100410_b34
– volume: 60
  start-page: 303
  year: 1988
  ident: 10.1016/j.array.2025.100410_b39
  article-title: Pareto equilibria in multiobjective games
  publication-title: Methods Oper Res
– volume: vol. 3
  start-page: 143
  year: 2014
  ident: 10.1016/j.array.2025.100410_b5
  article-title: SDN architecture impact on network security
– volume: 17
  start-page: 27
  issue: 6
  year: 2003
  ident: 10.1016/j.array.2025.100410_b32
  article-title: Bandwidth estimation: metrics, measurement techniques, and tools
  publication-title: IEEE Netw
  doi: 10.1109/MNET.2003.1248658
– volume: 11
  start-page: 65
  issue: 3
  year: 2019
  ident: 10.1016/j.array.2025.100410_b15
  article-title: A game-theoretic analysis for distributed honeypots
  publication-title: Futur Internet
  doi: 10.3390/fi11030065
– start-page: 1:1
  year: 2021
  ident: 10.1016/j.array.2025.100410_b17
  article-title: Game-theoretic modeling of DDoS attacks in cloud computing
– start-page: 319
  year: 2021
  ident: 10.1016/j.array.2025.100410_b22
  article-title: An intrusion detection and prevention system for ddos attacks using a 2-player bayesian game theoretic approach
– year: 2018
  ident: 10.1016/j.array.2025.100410_b25
  article-title: A variational approach to network games
  publication-title: SSRN Electron J
  doi: 10.2139/ssrn.3143468
– volume: 97
  year: 2020
  ident: 10.1016/j.array.2025.100410_b16
  article-title: Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2020.101976
– volume: 20
  start-page: 804
  issue: 3
  year: 2020
  ident: 10.1016/j.array.2025.100410_b28
  article-title: A stackelberg security game for adversarial outbreak detection in the Internet of Things
  publication-title: Sensors
  doi: 10.3390/s20030804
– volume: 49
  start-page: 115
  issue: 3
  year: 2005
  ident: 10.1016/j.array.2025.100410_b38
  article-title: Multiobjective games and determining pareto-nash equilibria
  publication-title: Bul Acad de c Stiin c Te A Mold Mat
– year: 2019
  ident: 10.1016/j.array.2025.100410_b37
– volume: 12
  start-page: 82
  issue: 1
  year: 2022
  ident: 10.1016/j.array.2025.100410_b11
  article-title: A partially observable stochastic zero-sum game for a network epidemic control problem
  publication-title: Dyn Games Appl
  doi: 10.1007/s13235-022-00430-6
– volume: 2
  start-page: 406
  issue: 4
  year: 2015
  ident: 10.1016/j.array.2025.100410_b26
  article-title: Decentralized protection strategies against SIS epidemics in networks
  publication-title: IEEE Trans Control Netw Syst
  doi: 10.1109/TCNS.2015.2426755
– start-page: 61
  year: 2006
  ident: 10.1016/j.array.2025.100410_b33
  article-title: Available bandwidth measurement as simple as running wget
– volume: 457
  start-page: 1634
  issue: 2
  year: 2018
  ident: 10.1016/j.array.2025.100410_b36
  article-title: On minimax and Pareto optimal security payoffs in multicriteria games
  publication-title: J Math Anal Appl
  doi: 10.1016/j.jmaa.2017.01.002
– volume: 17
  start-page: 1
  issue: 1
  year: 2009
  ident: 10.1016/j.array.2025.100410_b23
  article-title: Virus spread in networks
  publication-title: IEEE/ ACM Trans Netw
  doi: 10.1109/TNET.2008.925623
– volume: 20
  start-page: 1500
  issue: 2
  year: 2023
  ident: 10.1016/j.array.2025.100410_b21
  article-title: A security enforcement framework for SDN controller using game theoretic approach
  publication-title: IEEE Trans Dependable Secur Comput
  doi: 10.1109/TDSC.2022.3158690
– year: 2021
  ident: 10.1016/j.array.2025.100410_b9
– volume: 73
  start-page: 3
  issue: 1
  year: 2020
  ident: 10.1016/j.array.2025.100410_b7
  article-title: A survey of DDoS attacking techniques and defence mechanisms in the IoT network
  publication-title: Telecommun Syst
  doi: 10.1007/s11235-019-00599-z
– volume: 139
  year: 2024
  ident: 10.1016/j.array.2025.100410_b13
  article-title: Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2023.103696
– volume: 39
  start-page: 475
  year: 2013
  ident: 10.1016/j.array.2025.100410_b2
  article-title: DNS amplification attack revisited
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2013.10.001
– volume: 90
  year: 2021
  ident: 10.1016/j.array.2025.100410_b29
  article-title: Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses
  publication-title: Comput Electr Eng
  doi: 10.1016/j.compeleceng.2021.106990
– volume: 50
  start-page: 80
  issue: 7
  year: 2017
  ident: 10.1016/j.array.2025.100410_b24
  article-title: DDoS in the IoT: Mirai and other botnets
  publication-title: Computer
  doi: 10.1109/MC.2017.201
– volume: 5
  issue: 1
  year: 2018
  ident: 10.1016/j.array.2025.100410_b35
  article-title: A review of multi-objective optimization: Methods and its applications
  publication-title: Cogent Eng
  doi: 10.1080/23311916.2018.1502242
– volume: 16
  start-page: 648
  issue: 1
  year: 2020
  ident: 10.1016/j.array.2025.100410_b6
  article-title: An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial internet of things
  publication-title: IEEE Trans Ind Informatics
  doi: 10.1109/TII.2019.2917912
– volume: 23
  start-page: 2429
  issue: 4
  year: 2021
  ident: 10.1016/j.array.2025.100410_b1
  article-title: Thirty years of DNS insecurity: Current issues and perspectives
  publication-title: IEEE Commun Surv Tutorials
  doi: 10.1109/COMST.2021.3105741
– volume: 5
  start-page: 58
  year: 2021
  ident: 10.1016/j.array.2025.100410_b31
  article-title: E2BaSeP: Efficient bayes based security protocol against ARP spoofing attacks in SDN architectures
  publication-title: J Hardw Syst Secur
  doi: 10.1007/s41635-020-00105-x
– volume: 183
  start-page: 64
  year: 2022
  ident: 10.1016/j.array.2025.100410_b30
  article-title: Towards security automation in software defined networks
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2021.11.014
– year: 2019
  ident: 10.1016/j.array.2025.100410_b8
– volume: 88
  start-page: 634
  issue: 4
  year: 2022
  ident: 10.1016/j.array.2025.100410_b3
  article-title: Review of game theory approaches for DDoS mitigation by SDN
  publication-title: Proc Indian Nat Sci Acad
  doi: 10.1007/s43538-022-00126-w
– volume: 19
  start-page: 2333
  issue: 4
  year: 2022
  ident: 10.1016/j.array.2025.100410_b18
  article-title: A game-theoretical approach for mitigating edge DDoS attack
  publication-title: IEEE Trans Dependable Secur Comput
  doi: 10.1109/TDSC.2021.3055559
– start-page: 02012
  year: 2020
  ident: 10.1016/j.array.2025.100410_b19
  article-title: Overview on MTD technology based on game theory
– volume: 5
  start-page: 17
  issue: 1
  year: 1960
  ident: 10.1016/j.array.2025.100410_b40
  article-title: On the evolution of random graphs
  publication-title: Publ Math Inst Hung Acad Sci
– volume: 55
  start-page: 186:1
  issue: 9
  year: 2023
  ident: 10.1016/j.array.2025.100410_b4
  article-title: Advancing SDN from OpenFlow to P4: A survey
  publication-title: ACM Comput Surv
  doi: 10.1145/3556973
– volume: 130
  start-page: 1
  year: 2019
  ident: 10.1016/j.array.2025.100410_b14
  article-title: Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2019.01.006
– volume: 12
  start-page: 187444
  year: 2024
  ident: 10.1016/j.array.2025.100410_b12
  article-title: Optimal honeypot allocation using core attack graph in partially observable stochastic games
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2024.3513461
– year: 2024
  ident: 10.1016/j.array.2025.100410_b20
– volume: 44
  start-page: 245
  issue: 12
  year: 2019
  ident: 10.1016/j.array.2025.100410_b10
  article-title: Using game theory to model DoS attack and defence
  publication-title: SĀdhanĀ
  doi: 10.1007/s12046-019-1228-4
– volume: 5
  start-page: 1682
  issue: 4
  year: 2018
  ident: 10.1016/j.array.2025.100410_b27
  article-title: Designing virus-resistant, high-performance networks: A game-formation approach
  publication-title: IEEE Trans Control Netw Syst
  doi: 10.1109/TCNS.2017.2747840
SSID ssj0002511158
Score 2.298563
Snippet Distributed Reflection Denial of Service (DrDoS) attack represents one of the most significant threats to network security. This cyber-attack exploits...
SourceID doaj
unpaywall
crossref
elsevier
SourceType Open Website
Open Access Repository
Index Database
Publisher
StartPage 100410
SubjectTerms Cyber security
Distributed Reflection Denial of Service
Domain Name System
Game theory
Software-defined network
SummonAdditionalLinks – databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT9swELdQ-7CnMQbTigbywx5nlCa2kzwCBaFJQ9OgEjxF5y9WKGlVUiH467nLB1oRmuAxkZ1Y57Pvd7q73zH23SUuHcapFWC1E9JYJwhWC5d4ChPl2mmqHf51qk_G8ueFumh5tqkWZiV-X-dhwWIBD-jIxYoi-pLKqfpaIfDusf749Pf-JbWPUznVRyvd8Qq9PnPF9tQU_Ssm6MOynMPDPUyn_5iY4_WmdvuuZiakzJKbvWVl9uzjC97GN67-E_vYQk2-3-jGBlvz5We23rVx4O2p3mR_6yJcMTPXzeXHr-DWcwSzPJDnjraNwxVMEEfyEdHsUocs7_gfH6Z1HlfJR7MzDlVF5fp8UvI7vNrvYeGF8wFBrONlk2u-xcbHR-eHJ6JtwCBsonUlvM-UTIyROQIDo6xMM3Rocx9kGtDPy7OMCOIgApPrMIxMFqQHBIRZFAiYxckX1itnpf_KuHVRSIGipIjQtPUQvEao4kwELoJYDdiPbmuKecOzUXQJaNdFLcWCpFg0UhywA9q-56FEkl2_QOkX7ZkrwtDlaSQhSk0sg8ogDiHFh8QqjSrqBkx3m1-0eKPBEfipyf__Lp5V5S2r3X7n-G-sVy2WfgfhTmV2WzV_AoX-_So
  priority: 102
  providerName: Unpaywall
Title Multi-objective game for fighting against Distributed Reflection DoS attacks in software-defined network
URI https://dx.doi.org/10.1016/j.array.2025.100410
https://doi.org/10.1016/j.array.2025.100410
https://doaj.org/article/f1d9704a07b24f58a2ff707b3c563d7d
UnpaywallVersion publishedVersion
Volume 26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2590-0056
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002511158
  issn: 2590-0056
  databaseCode: DOA
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2590-0056
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002511158
  issn: 2590-0056
  databaseCode: M~E
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUQHOiFr7ZiaUE-cMTCmziOc4QCQkggBF0JTtE4tumibRZtgxCX_nZm4gQtF9oDl0iJIns0k8y8kd_MMLbrUpcPk7wSUGknlK2cIFgtXOrpmKjQTlPt8PmFPh2ps5vsZm7UF3HCYnvgqLj9MHRFLhXI3CYqZAaSEHK8SatM4z6OvK80xVwyRT6YgPMwM32boZbQBbMZPGNGmGREDVBUMzsXitqO_W8i0vJj_QDPTzCZzEWckzW20kFFfhBFXGcLvt5gq_0YBt79lZ_Zr7aIVkztfXRe_A5-e45glAfKvDE2cbiDMeJAfkRtcmnClXf8yodJy8Oq-dH0mkPTULk9H9f8D7rmJ5h54XxAEOp4HbniX9jo5Pjnj1PRDVAQVap1I7w3mUqtVQUGdptVKjeYkBY-qDxgnlYYQw3eQIItdBhKa4LygIDOyEDAKkm_ssV6WvtNxisnQw50yokIS1cegtcINZyV4CQk2YDt9bosH2KfjLInkN2XrepLUn0ZVT9gh6Tv11epyXX7AE1fdqYv_2X6AdO9tcoOL0QcgEuN399dvNr2f6Td-ghpv7FPtGSk-n5ni83s0W8joGnsTvvt4vX87_EOWxpdXB7cvgAvWPZ6
linkProvider Directory of Open Access Journals
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT9swELdQ-7CnMQbTigbywx5nlCa2kzwCBaFJQ9OgEjxF5y9WKGlVUiH467nLB1oRmuAxkZ1Y57Pvd7q73zH23SUuHcapFWC1E9JYJwhWC5d4ChPl2mmqHf51qk_G8ueFumh5tqkWZiV-X-dhwWIBD-jIxYoi-pLKqfpaIfDusf749Pf-JbWPUznVRyvd8Qq9PnPF9tQU_Ssm6MOynMPDPUyn_5iY4_WmdvuuZiakzJKbvWVl9uzjC97GN67-E_vYQk2-3-jGBlvz5We23rVx4O2p3mR_6yJcMTPXzeXHr-DWcwSzPJDnjraNwxVMEEfyEdHsUocs7_gfH6Z1HlfJR7MzDlVF5fp8UvI7vNrvYeGF8wFBrONlk2u-xcbHR-eHJ6JtwCBsonUlvM-UTIyROQIDo6xMM3Rocx9kGtDPy7OMCOIgApPrMIxMFqQHBIRZFAiYxckX1itnpf_KuHVRSIGipIjQtPUQvEao4kwELoJYDdiPbmuKecOzUXQJaNdFLcWCpFg0UhywA9q-56FEkl2_QOkX7ZkrwtDlaSQhSk0sg8ogDiHFh8QqjSrqBkx3m1-0eKPBEfipyf__Lp5V5S2r3X7n-G-sVy2WfgfhTmV2WzV_AoX-_So
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi-objective+game+for+fighting+against+Distributed+Reflection+DoS+attacks+in+software-defined+network&rft.jtitle=Array+%28New+York%29&rft.au=Kengne+Tchendji%2C+Vianney&rft.au=Velempini%2C+Mthulisi&rft.au=Chassem+Kamdem%2C+Priva&rft.date=2025-07-01&rft.pub=Elsevier+Inc&rft.issn=2590-0056&rft.eissn=2590-0056&rft.volume=26&rft_id=info:doi/10.1016%2Fj.array.2025.100410&rft.externalDocID=S2590005625000372
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2590-0056&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2590-0056&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2590-0056&client=summon