메뉴 건너뛰기




Volumn 8, Issue 5, 2017, Pages 2474-2482

Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid

Author keywords

advanced metering infrastructure; distributed denial of service attack; game theory; Honeypot; smart grid

Indexed keywords

ADVANCED METERING INFRASTRUCTURES; COMPUTER CRIME; ELECTRIC POWER TRANSMISSION NETWORKS; GAME THEORY; NETWORK SECURITY; SMART POWER GRIDS;

EID: 85029412781     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2017.2670144     Document Type: Article
Times cited : (200)

References (37)
  • 1
    • 84962464694 scopus 로고    scopus 로고
    • A real-time information based demandside management system in smart grid
    • Feb.
    • F. Ye, Y. Qian, R. Q. Hu, "A real-time information based demandside management system in smart grid, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 329-339, Feb. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 329-339
    • Ye, F.1    Qian, Y.2    Hu, R.Q.3
  • 2
    • 84892561397 scopus 로고    scopus 로고
    • Securing vehicle-to-grid communications in the smart grid
    • Dec.
    • Y. Zhang, et al., "Securing vehicle-to-grid communications in the smart grid, " IEEE Wireless Commun., vol. 20, no. 6, pp. 66-73, Dec. 2013.
    • (2013) IEEE Wireless Commun. , vol.20 , Issue.6 , pp. 66-73
    • Zhang, Y.1
  • 3
    • 85009985992 scopus 로고    scopus 로고
    • A survey on energy Internet: Architecture, approach, emerging technologies
    • to be published
    • K. Wang, et al., "A survey on energy Internet: Architecture, approach, emerging technologies, " IEEE Syst. J., to be published, doi: 10.1109/JSYST.2016.2639820.
    • IEEE Syst. J.
    • Wang, K.1
  • 4
    • 2342615538 scopus 로고    scopus 로고
    • Anti-honeypot technology
    • Jan./Feb.
    • N. Krawetz, "Anti-honeypot technology, " IEEE Security Privacy, vol. 2, no. 1, pp. 76-79, Jan./Feb. 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.1 , pp. 76-79
    • Krawetz, N.1
  • 5
    • 84960408460 scopus 로고    scopus 로고
    • Demand response management in the smart grid in a large population regime
    • Jan.
    • S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, T. Basar, "Demand response management in the smart grid in a large population regime, " IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 189-199, Jan. 2016.
    • (2016) IEEE Trans. Smart Grid , vol.7 , Issue.1 , pp. 189-199
    • Maharjan, S.1    Zhu, Q.2    Zhang, Y.3    Gjessing, S.4    Basar, T.5
  • 6
    • 85012113344 scopus 로고    scopus 로고
    • Toward trustworthy crowdsourcing in the social Internet of Things
    • Oct.
    • K. Wang, X. Qi, L. Shu, D.-J. Deng, J. J. P. C. Rodrigues, "Toward trustworthy crowdsourcing in the social Internet of Things, " IEEE Wireless Commun., vol. 23, no. 5, pp. 30-36, Oct. 2016.
    • (2016) IEEE Wireless Commun. , vol.23 , Issue.5 , pp. 30-36
    • Wang, K.1    Qi, X.2    Shu, L.3    Deng, D.-J.4    Rodrigues, J.J.P.C.5
  • 7
    • 84962034263 scopus 로고    scopus 로고
    • Mobile big data fault-tolerant processing for eHealth networks
    • Jan./Feb.
    • K. Wang, Y. Shao, L. Shu, C. Zhu, Y. Zhang, "Mobile big data fault-tolerant processing for eHealth networks, " IEEE Netw., vol. 30, no. 1, pp. 36-42, Jan./Feb. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.1 , pp. 36-42
    • Wang, K.1    Shao, Y.2    Shu, L.3    Zhu, C.4    Zhang, Y.5
  • 8
    • 84861317311 scopus 로고    scopus 로고
    • Cognitive machine-to-machine communications: Visions and potentials for the smart grid
    • May/Jun.
    • Y. Zhang, et al., "Cognitive machine-to-machine communications: Visions and potentials for the smart grid, " IEEE Netw., vol. 26, no. 3, pp. 6-13, May/Jun. 2012.
    • (2012) IEEE Netw. , vol.26 , Issue.3 , pp. 6-13
    • Zhang, Y.1
  • 9
    • 84992213754 scopus 로고    scopus 로고
    • Game-theory-based active defense for intrusion detection in cyber-physical embedded systems
    • K. Wang, et al., "Game-theory-based active defense for intrusion detection in cyber-physical embedded systems, " ACM Trans. Embedded Comput. Syst., vol. 16, no. 1, 2016, Art. no. 18.
    • (2016) ACM Trans. Embedded Comput. Syst. , vol.16 , Issue.1
    • Wang, K.1
  • 10
    • 84905736269 scopus 로고    scopus 로고
    • A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks
    • Sep.
    • H. Moosavi and F. M. Bui, "A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 9, pp. 1367-1379, Sep. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.9 , pp. 1367-1379
    • Moosavi, H.1    Bui, F.M.2
  • 11
    • 85028151153 scopus 로고    scopus 로고
    • Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study
    • Mar.
    • M. A. Faisal, Z. Aung, J. R. Williams, A. Sanchez, "Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study, " IEEE Syst. J., vol. 9, no. 1, pp. 31-44, Mar. 2015.
    • (2015) IEEE Syst. J. , vol.9 , Issue.1 , pp. 31-44
    • Faisal, M.A.1    Aung, Z.2    Williams, J.R.3    Sanchez, A.4
  • 12
    • 84959182382 scopus 로고    scopus 로고
    • A game theorybased energy management system using price elasticity for smart grids
    • Dec.
    • K. Wang, Z. Ouyang, R. Krishnan, L. Shu, L. He, "A game theorybased energy management system using price elasticity for smart grids, " IEEE Trans. Ind. Informat., vol. 11, no. 6, pp. 1607-1616, Dec. 2015.
    • (2015) IEEE Trans. Ind. Informat. , vol.11 , Issue.6 , pp. 1607-1616
    • Wang, K.1    Ouyang, Z.2    Krishnan, R.3    Shu, L.4    He, L.5
  • 13
    • 84949922968 scopus 로고    scopus 로고
    • A security protocol for advanced metering infrastructure in smart grid
    • F. Ye, Y. Qian, R. Q. Hu, "A security protocol for advanced metering infrastructure in smart grid, " in Proc. IEEE Globecom, Austin, TX, USA, 2014, pp. 649-654.
    • (2014) Proc. IEEE Globecom, Austin, TX, USA , pp. 649-654
    • Ye, F.1    Qian, Y.2    Hu, R.Q.3
  • 14
    • 84878116403 scopus 로고    scopus 로고
    • A key management scheme for secure communications of advanced metering infrastructure in smart grid
    • Oct.
    • N. Liu, J. Chen, L. Zhu, J. Zhang, Y. He, "A key management scheme for secure communications of advanced metering infrastructure in smart grid, " IEEE Trans. Ind. Electron., vol. 60, no. 10, pp. 4746-4756, Oct. 2013.
    • (2013) IEEE Trans. Ind. Electron. , vol.60 , Issue.10 , pp. 4746-4756
    • Liu, N.1    Chen, J.2    Zhu, L.3    Zhang, J.4    He, Y.5
  • 15
    • 80053502277 scopus 로고    scopus 로고
    • Cognitive radio based hierarchical communications infrastructure for smart grid
    • Sep./Oct.
    • R. Yu, et al., "Cognitive radio based hierarchical communications infrastructure for smart grid, " IEEE Netw., vol. 25, no. 5, pp. 6-14, Sep./Oct. 2011.
    • (2011) IEEE Netw. , vol.25 , Issue.5 , pp. 6-14
    • Yu, R.1
  • 16
    • 85029212593 scopus 로고    scopus 로고
    • Antieavesdropping with selfish jamming in wireless networks: A Bertrand game approach
    • to be published
    • K. Wang, L. Yuan, T. Miyazhaki, S. Guo, Y. Sun, "Antieavesdropping with selfish jamming in wireless networks: A Bertrand game approach, " IEEE Trans. Veh. Technol., to be published, doi: 10.1109/TVT.2016.2639827.
    • IEEE Trans. Veh. Technol.
    • Wang, K.1    Yuan, L.2    Miyazhaki, T.3    Guo, S.4    Sun, Y.5
  • 17
    • 34547994752 scopus 로고    scopus 로고
    • Improving mobile core network security with honeynets
    • Jul./Aug.
    • C. K. Dimitriadis, "Improving mobile core network security with honeynets, " IEEE Security Privacy, vol. 5, no. 4, pp. 40-47, Jul./Aug. 2007.
    • (2007) IEEE Security Privacy , vol.5 , Issue.4 , pp. 40-47
    • Dimitriadis, C.K.1
  • 18
    • 84859087475 scopus 로고    scopus 로고
    • Nash equilibrium of node cooperation based on metamodel for MANETs
    • K. Wang and M. Wu, "Nash equilibrium of node cooperation based on metamodel for MANETs, " J. Inf. Sci. Eng., vol. 28, no. 2, pp. 317-333, 2012.
    • (2012) J. Inf. Sci. Eng. , vol.28 , Issue.2 , pp. 317-333
    • Wang, K.1    Wu, M.2
  • 20
    • 35048879637 scopus 로고    scopus 로고
    • HoneyStat: Local worm detection using honeypots
    • D. Dagon, et al., "HoneyStat: Local worm detection using honeypots, " in Proc. 7th Int. Symp. RAID, 2004, pp. 39-58.
    • (2004) Proc. 7th Int. Symp. RAID , pp. 39-58
    • Dagon, D.1
  • 22
    • 85015100023 scopus 로고    scopus 로고
    • Attack detection and distributed forensics in machine-to-machine networks
    • Nov./Dec.
    • K. Wang, M. Du, Y. Sun, A. Vinel, Y. Zhang, "Attack detection and distributed forensics in machine-to-machine networks, " IEEE Netw., vol. 30, no. 6, pp. 49-55, Nov./Dec. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.6 , pp. 49-55
    • Wang, K.1    Du, M.2    Sun, Y.3    Vinel, A.4    Zhang, Y.5
  • 23
    • 33750376717 scopus 로고    scopus 로고
    • Scalability, fidelity and containment in the Potemkin virtual honeyfarm
    • M. Vrable, et al., "Scalability, fidelity and containment in the Potemkin virtual honeyfarm, " in Proc. ACM Symp. SOSP, Brighton, U.K., 2005, pp. 148-162.
    • (2005) Proc. ACM Symp. SOSP, Brighton, U.K. , pp. 148-162
    • Vrable, M.1
  • 24
    • 25844462447 scopus 로고    scopus 로고
    • Defending against Internet worms: A signaturebased approach
    • Y. Tang and S. Chen, "Defending against Internet worms: A signaturebased approach, " in Proc. IEEE INFOCOM, Miami, FL, USA, 2005, pp. 1384-1394.
    • (2005) Proc. IEEE INFOCOM, Miami, FL, USA , pp. 1384-1394
    • Tang, Y.1    Chen, S.2
  • 31
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • T. Peng, C. Leckie, K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems, " ACM Comput. Surveys, vol. 39, no. 1, pp. 60-67, 2007.
    • (2007) ACM Comput. Surveys , vol.39 , Issue.1 , pp. 60-67
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 33
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of Web services under distributed denial of service attacks
    • Feb.
    • J. Xu and W. Lee, "Sustaining availability of Web services under distributed denial of service attacks, " IEEE Trans. Comput., vol. 52, no. 2, pp. 195-208, Feb. 2003.
    • (2003) IEEE Trans. Comput. , vol.52 , Issue.2 , pp. 195-208
    • Xu, J.1    Lee, W.2
  • 34
    • 44649146686 scopus 로고    scopus 로고
    • DDoS mitigation in non-cooperative environments
    • G. Yan and S. Eidenbenz, "DDoS mitigation in non-cooperative environments, " in Proc. Int. Conf. Netw., Singapore, 2008, pp. 599-611.
    • (2008) Proc. Int. Conf. Netw., Singapore , pp. 599-611
    • Yan, G.1    Eidenbenz, S.2
  • 36
    • 84869471527 scopus 로고    scopus 로고
    • How resilient is the Internet against DDoS attacks?-A game theoretic analysis of signature-based rate limiting
    • W. Zang, P. Liu, M. Yu, "How resilient is the Internet against DDoS attacks?-A game theoretic analysis of signature-based rate limiting, " Int. J. Intell. Control Syst., vol. 12, no. 4, pp. 307-316, 2007.
    • (2007) Int. J. Intell. Control Syst. , vol.12 , Issue.4 , pp. 307-316
    • Zang, W.1    Liu, P.2    Yu, M.3
  • 37
    • 84896821112 scopus 로고    scopus 로고
    • Demand response management with multiple utility companies: A two-level game approach
    • Mar.
    • B. Chai, J. Chen, Z. Yang, Y. Zhang, "Demand response management with multiple utility companies: A two-level game approach, " IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 722-731, Mar. 2014.
    • (2014) IEEE Trans. Smart Grid , vol.5 , Issue.2 , pp. 722-731
    • Chai, B.1    Chen, J.2    Yang, Z.3    Zhang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.