Proceedings of the 6th International Conference on Information Engineering for Mechanics and Materials

Game based DDoS Attack Strategies in Cloud of Things

Authors
Yichuan Wang, Yefei Zhang, Liumei Zhang, Lei Zhu, Yanxiao Liu
Corresponding Author
Yichuan Wang
Available Online November 2016.
DOI
10.2991/icimm-16.2016.137How to use a DOI?
Keywords
Cloud of Things, Network Security, DDoS Attack, Smart Gateway
Abstract

Integration of Internet of Things (IoT) with Cloud Computing, termed as Cloud of Things (CoT). In typical CoT infrastructure, the data collected from wireless sensor networks and IoTs will be transmitted through smart gateway (SG) to cloud. The bandwidth between IoT access point and SG becomes a bottleneck for information transmission. In this paper, we propose a novel game-theory model to describe the CoT attacker, who expects to use minimum set of IoT attack devices to occupy as much bandwidth resources as possible in a given time. By analyzing the model, we have found that the game model is a non-cooperative and repeated games of incomplete information. The best strategy for the attacker is that if over the half of attack connections are effective, decreasing number of attack nodes; contrary, increasing number of attack nodes. The simulation result shows that our strategy can decrease the number of exposed attack devices for the Distributed Denial of Service(DDoS) attack significantly.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 6th International Conference on Information Engineering for Mechanics and Materials
Series
Advances in Engineering Research
Publication Date
November 2016
ISBN
10.2991/icimm-16.2016.137
ISSN
2352-5401
DOI
10.2991/icimm-16.2016.137How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Yichuan Wang
AU  - Yefei Zhang
AU  - Liumei Zhang
AU  - Lei Zhu
AU  - Yanxiao Liu
PY  - 2016/11
DA  - 2016/11
TI  - Game based DDoS Attack Strategies in Cloud of Things
BT  - Proceedings of the 6th International Conference on Information Engineering for Mechanics and Materials
PB  - Atlantis Press
SP  - 759
EP  - 762
SN  - 2352-5401
UR  - https://doi.org/10.2991/icimm-16.2016.137
DO  - 10.2991/icimm-16.2016.137
ID  - Wang2016/11
ER  -