2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS) 2020
DOI: 10.1109/iwqos49365.2020.9213026
|View full text |Cite
|
Sign up to set email alerts
|

Application-Layer DDoS Defense with Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…where x i denotes the attack level in host i, β i denotes the attack rate, δ i denotes the defense rate, and E ij denotes the edge weights between hosts. Afterward, we apply Euler's method [60] to Equation (20) to derive the second discrete-time model with time index m and a random sample Z > 0 as:…”
Section: Visual Displaymentioning
confidence: 99%
See 1 more Smart Citation
“…where x i denotes the attack level in host i, β i denotes the attack rate, δ i denotes the defense rate, and E ij denotes the edge weights between hosts. Afterward, we apply Euler's method [60] to Equation (20) to derive the second discrete-time model with time index m and a random sample Z > 0 as:…”
Section: Visual Displaymentioning
confidence: 99%
“…Addressing SYN-ACK-based attacks is a topic of much debate. The brute-force method, as described in [20], aims to inflate the data structure for TCP connections awaiting acknowledgment, making it cumbersome for average attacker requests to sustain bandwidth constraints. While effective, this method is not without its pitfalls.…”
mentioning
confidence: 99%
“…Feng et al [9] propose a reinforcement-learning-based model to detect and mitigate App-DDoS attacks. The model is continuously trained with various metrics related to the server's load, the dynamic behaviors of clients, and the network load of the victim.…”
Section: B Machine-learning Based Techniquesmentioning
confidence: 99%
“…Other techniques have been proposed to protect disadvantageous cyber systems from falling victim to resourceful and determined attacks such as Distributed Denial-of-Service (DDoS) or powerful jamming attacks. For example, [55] mitigates DDoS Flooding in Software-Defined Networks; [69] introduces a multi-objective reward function to guide an RL agent to learn the most suitable action in mitigating application-layer DDoS attacks; [70] proposes a feature adaption RL approach based on the space-time flow regularities in IoV for DDoS mitigation. Among the works of RL for DDoS attack, there has been recent attention on large-scale solution [54,53] via cooperative RL, low-rate attacks in the edge environment [71], and sparse constraint in cloud computing [72].…”
Section: Posture-related Vulnerabilitymentioning
confidence: 99%