A game theoretic defence framework against DoS/DDoS cyber attacks

[1]  Theodore Tryfonas,et al.  A Qualitative Approach to Information Availability , 2000, SEC.

[2]  E. Eugene Schultz A framework for understanding and predicting insider attacks , 2002, Comput. Secur..

[3]  Wang Gui-juan Denial of Service and Defence , 2003 .

[4]  Martin J. Osborne,et al.  An Introduction to Game Theory , 2003 .

[5]  Eddie Kohler,et al.  Internet research needs better models , 2003, CCRV.

[6]  Steve Greenberg,et al.  Best Practices for Data Centers: Lessons Learned from Benchmarking 22 Data Centers , 2006 .

[7]  Giannis F. Marias,et al.  SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment , 2007, 2007 16th International Conference on Computer Communications and Networks.

[8]  Jonathan Matusitz,et al.  A Postmodern Theory of Cyberterrorism: Game Theory , 2009, Inf. Secur. J. A Glob. Perspect..

[9]  Jin-Cherng Lin,et al.  A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.

[10]  Nirwan Ansari,et al.  Is it congestion or a DDoS attack? , 2009, IEEE Communications Letters.

[11]  Haining Wang,et al.  Profit-aware overload protection in E-commerce Web sites , 2009, J. Netw. Comput. Appl..

[12]  Chase Qishi Wu,et al.  On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks , 2010, SpringSim.

[13]  Dimitris Gritzalis,et al.  An Insider Threat Prediction Model , 2010, TrustBus.

[14]  Mehran S. Fallah A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory , 2010, IEEE Transactions on Dependable and Secure Computing.

[15]  Sankardas Roy,et al.  Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[16]  Dimitris Gritzalis,et al.  Formal analysis for robust anti-SPIT protection using model checking , 2012, International Journal of Information Security.