{"id":"https://openalex.org/W4388738110","doi":"https://doi.org/10.1145/3606043.3606091","title":"Game Theoretic Defense Scheme for DDoS Attacks Based on Finite Rationality Analysis","display_name":"Game Theoretic Defense Scheme for DDoS Attacks Based on Finite Rationality Analysis","publication_year":2023,"publication_date":"2023-06-17","ids":{"openalex":"https://openalex.org/W4388738110","doi":"https://doi.org/10.1145/3606043.3606091"},"language":"en","primary_location":{"id":"doi:10.1145/3606043.3606091","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3606043.3606091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on High Performance Compilation, Computing and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039952852","display_name":"Yiting Huang","orcid":"https://orcid.org/0009-0009-1070-0602"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiting Huang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012550933","display_name":"Tengchao Ma","orcid":"https://orcid.org/0000-0003-3633-4881"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tengchao Ma","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063589824","display_name":"Ruiyan Liu","orcid":"https://orcid.org/0009-0007-2700-0667"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiyan Liu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030578465","display_name":"Qingzhao An","orcid":"https://orcid.org/0000-0002-9540-0896"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingzhao An","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101713914","display_name":"Lin Yan","orcid":"https://orcid.org/0009-0007-2586-8702"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Yan","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5039952852"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52430693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"339","last_page":"344"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.722769558429718},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7223273515701294},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6358879804611206},{"id":"https://openalex.org/keywords/rationality","display_name":"Rationality","score":0.5556175112724304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5482112765312195},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5377256274223328},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.444012850522995},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.1879899501800537},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1490609347820282},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11336323618888855},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11051493883132935}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.722769558429718},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7223273515701294},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6358879804611206},{"id":"https://openalex.org/C201717286","wikidata":"https://www.wikidata.org/wiki/Q938185","display_name":"Rationality","level":2,"score":0.5556175112724304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5482112765312195},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5377256274223328},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.444012850522995},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.1879899501800537},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1490609347820282},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11336323618888855},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11051493883132935},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3606043.3606091","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3606043.3606091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on High Performance Compilation, Computing and Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1572857353","https://openalex.org/W1944367927","https://openalex.org/W2061109653","https://openalex.org/W2070586534","https://openalex.org/W2086454935","https://openalex.org/W2094352181","https://openalex.org/W2162969618","https://openalex.org/W2885293271","https://openalex.org/W2991543633","https://openalex.org/W3161554626","https://openalex.org/W4206281848","https://openalex.org/W4224255750","https://openalex.org/W4230776677","https://openalex.org/W4233251690"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2898696280","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Distributed":[0],"denial-of-service":[1],"(DDoS)":[2],"attacks":[3,96],"continue":[4],"to":[5,10,31,35,103,154,169,205,223,236],"pose":[6],"a":[7,16,89,115,162],"significant":[8],"threat":[9],"network":[11,22],"security":[12],"today":[13],"and":[14,18,24,40,63,80,127,141,166,177,179,193,228],"represent":[15],"constant":[17],"critical":[19],"concern":[20],"for":[21,47,94,187],"administrators":[23],"researchers.":[25],"Unprotected":[26],"systems":[27],"are":[28,43,65],"highly":[29],"vulnerable":[30],"paralysis":[32],"when":[33,199],"subjected":[34],"DDoS":[36,50,95,111,239],"attacks.":[37,51,240],"Game-theoretic":[38],"modeling":[39],"analysis":[41,164,215],"schemes":[42],"gaining":[44],"increasing":[45],"popularity":[46],"defending":[48],"against":[49,156],"However,":[52],"the":[53,110,121,125,134,138,142,148,151,157,171,175,182,188,200,208,212,225,231],"majority":[54],"of":[55,124,144,174,233],"existing":[56],"game-theoretic":[57],"approaches":[58],"assume":[59],"that":[60,97,198],"both":[61],"attackers":[62],"defenders":[64],"perfectly":[66],"rational,":[67],"thereby":[68],"overlooking":[69],"situations":[70],"where":[71],"participants":[72],"make":[73],"mistakes,":[74],"resulting":[75],"in":[76,217],"discrepancies":[77],"between":[78],"predicted":[79],"actual":[81],"results.":[82],"To":[83],"address":[84],"this":[85],"issue,":[86],"we":[87,108,160,180,195],"propose":[88],"finite":[90],"rational":[91,206],"defense":[92,226,234],"scheme":[93],"incorporates":[98],"quantum":[99],"response":[100],"equilibrium":[101,184,221],"(QRE)":[102],"analyze":[104],"irrational":[105,204],"participant":[106],"behavior.Initially,":[107],"model":[109,170],"attack":[112],"scenario":[113],"as":[114],"zero-sum":[116],"game.":[117],"We":[118],"then":[119],"examine":[120],"primary":[122],"function":[123],"attacker\u2019s":[126],"defender\u2019s":[128],"strategies.":[129],"The":[130],"attacker":[131,176,201],"maliciously":[132],"squeezes":[133],"bandwidth":[135],"by":[136],"adjusting":[137],"traffic":[139,152],"size":[140],"number":[143],"zombie":[145],"nodes,":[146],"while":[147],"defender":[149,209],"adjusts":[150],"threshold":[153,227],"defend":[155],"attack.":[158],"Finally,":[159],"construct":[161],"QRE":[163,168,186,213],"strategy":[165],"use":[167],"error":[172],"propensity":[173],"defender,":[178],"compare":[181],"Nash":[183,220],"with":[185,219,238],"optimal":[189],"decision":[190],"process.Through":[191],"simulations":[192],"experiments,":[194],"have":[196],"discovered":[197],"transitions":[202],"from":[203],"behavior,":[207],"can":[210],"utilize":[211],"real-time":[214],"results":[216],"combination":[218],"conditions":[222],"adjust":[224],"further":[229],"enhance":[230],"sensitivity":[232],"nodes":[235],"cope":[237]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
