A survey: When moving target defense meets game theory

J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

[HTML][HTML] Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey

X Etxezarreta, I Garitano, M Iturbe… - International Journal of …, 2023 - Elsevier
Abstract Industrial Control Systems (ICSs) are a key technology for life-sustainability, social
development and economic progress used in a wide range of industrial solutions, including …

A differential game approach for real-time security defense decision in scale-free networks

H Zhang, Y Mi, X Liu, Y Zhang, J Wang, J Tan - Computer Networks, 2023 - Elsevier
The current network security defense decision method is based on the principle of attack–
defense confrontation and generally uses a random network model to project the real …

An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks

Y Zhou, G Cheng, S Yu - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming truly ubiquitous in every domain of human lives, and
a large number of objects can be connected and enabled to communicate with cloud servers …

Scema: an sdn-oriented cost-effective edge-based mtd approach

A Javadpour, F Ja'fari, T Taleb… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Protecting large-scale networks, especially Software-Defined Networks (SDNs), against
distributed attacks in a cost-effective manner plays a prominent role in cybersecurity. One of …

A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …

Learning near-optimal intrusion responses against dynamic attackers

K Hammar, R Stadler - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stop** game where attack and defense strategies evolve …

ReLFA: Resist link flooding attacks via renyi entropy and deep reinforcement learning in SDN-IoT

J Wang, Y Liu, W Zhang, X Yan, N Zhou… - China …, 2022 - ieeexplore.ieee.org
Link flooding attack (LFA) is a fresh distributed denial of service attack (DDoS). Attackers can
cut off the critical links, making the services in the target area unavailable. LFA manipulates …

Defending against flooding attacks in the internet of drones environment

C Pu, P Zhu - 2021 IEEE Global Communications Conference …, 2021 - ieeexplore.ieee.org
Even though drones are still in the infancy period in terms of widespread adoption and use,
they have already pierced through solid conventional barriers in various domains of …

A stackelberg game approach to the stability of networked switched systems under DoS attacks

J Lian, P Jia, F Wu, X Huang - IEEE Transactions on Network …, 2023 - ieeexplore.ieee.org
This paper investigates the stability of networked switched systems under DoS attacks by a
Stackelberg game approach. Firstly, the non-cooperative competition between the attacker …