A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack
- PDF / 2,299,457 Bytes
- 16 Pages / 595.276 x 790.866 pts Page_size
- 32 Downloads / 169 Views
A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack Amrita Dahiya 1 & Brij B. Gupta 1,2,3 Accepted: 23 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Incentives are very important to be employed in any defensive mechanism against DDoS attack. Incentive is a major concept abandoned by most of the defensive mechanisms that have been proposed so far. It is a tool that can motivate users to send data wisely into the network. Therefore, in this paper, we have proposed a two layered multi-attribute auction mechanism for incentivising users by imposing payment schemes as well as by providing rewards. Apart from this, we have developed a reputation assessment procedure to identify malicious user by monitoring his credibility score calculated through his marginal utility. Identified malicious users are then mapped to different levels of suspiciousness. Identified legitimate users are forwarded towards first level of auction in which virtual users have been added by service provider to increase the competition among users. Critical values are computed for every user and the users satisfying the criteria are moved towards the second level. In second level, greedy method is utilized for resource allocation. Extensive simulations have been conducted on MatLab to check the validity of the proposed model. Rate of social welfare degradation and user’s satisfaction are utilized to check the appropriateness and validity of the model. Results from experimentation have shown that proposed model is able to generate enough revenue for the service provider and is able to provide acceptable QoS to identified legitimate users when there is an increase in number of malicious users. Keywords DDoS attack . Incentive compatibility . Multi-attribute based auction . Truthfulness
1 Introduction DDoS attack is a deliberate attempt by several bot machines to make target machine dispense all its resources on processing of voluminous dummy service requests. It not only targets the victim machine but also depletes the underlying resources on the intermediate paths leading to the victim machine. Internet has already taken an immeasurable form that provides a common platform for good and bad agents. Despite being provided with numerous research and security mechanisms for
* Brij B. Gupta [email protected] Amrita Dahiya [email protected] 1
National Institute of Technology Kurukshetra, Kurukshetra, India
2
Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan
3
Macquarie University, Sydney, Australia
Internet, we cannot make it a safer place. It is one of the severe cyber-attacks that are continuously growing in frequency, complexity and scale day by day [1]. Moreover, attackers have been leveraging cutting edge techniques, tools and methods to raise destruction and complexity level to a challenging and daunting stage [2]. There is no denying the fact that Internet has non-uniform distribution of resources and incentives.
Data Loading...