Loading…
Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net
The urging need for seamless connectivity in mobile environment has contributed to the rapid expansion of Mobile IP. Mobile IP uses wireless transmission medium, thereby making it subject to many security threats during various phases of route optimization. Modeling Mobile IP attacks reasonably and...
Saved in:
Published in: | arXiv.org 2018-04 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Talukder, Sajedul Md Iftekharul Islam Sakib Hossen, Md Faruk Zahidur Rahim Talukder Hossain, Md Shohrab |
description | The urging need for seamless connectivity in mobile environment has contributed to the rapid expansion of Mobile IP. Mobile IP uses wireless transmission medium, thereby making it subject to many security threats during various phases of route optimization. Modeling Mobile IP attacks reasonably and efficiently is the basis for defending against those attacks, which requires quantitative analysis and modeling approaches for expressing threat propagation in Mobile IP. In this Paper, we present four well-known Mobile IP attacks, such as Denial-of-Service (DoS) attack, bombing attack, redirection attack and replay attack and model them with Stochastic Game Petri Net (SGPN). Furthermore, we propose mixed strategy based defense strategies for the aforementioned attacks and model them with SGPN. Finally, we calculate the Nash Equilibrium of the attacker-defender game and thereby obtain the steady state probability of the vulnerable attack states. We show that, under the optimal strategy, an IDS needs to remain active 72.4%, 70%, 68.4% and 66.6% of the time to restrict the attacker's success rate to 8.5%, 6.4%, 7.2% and 8.3% respectively for the aforementioned attacks, thus performing better than the state-of-the-art approach. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2072214775</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2072214775</sourcerecordid><originalsourceid>FETCH-proquest_journals_20722147753</originalsourceid><addsrcrecordid>eNqNissKgkAUQIcgSMp_uNBaGK_aRLvoHRRC7WXSa47ZTDkj_X4u-oBW58A5A-ZhFIXBPEYcMd_amnOOM4FJEnnsuHRO5g8LUhewppK0JQtKw8ncVENwSBe9FtQofYePchVcnMkraZ3KYSefBCm5VsGZ3IQNS9lY8n8cs-l2c13tg1dr3h1Zl9Wma3WfMuQCMYyFSKL_ri8PbjtL</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2072214775</pqid></control><display><type>article</type><title>Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net</title><source>Access via ProQuest (Open Access)</source><creator>Talukder, Sajedul ; Md Iftekharul Islam Sakib ; Hossen, Md Faruk ; Zahidur Rahim Talukder ; Hossain, Md Shohrab</creator><creatorcontrib>Talukder, Sajedul ; Md Iftekharul Islam Sakib ; Hossen, Md Faruk ; Zahidur Rahim Talukder ; Hossain, Md Shohrab</creatorcontrib><description>The urging need for seamless connectivity in mobile environment has contributed to the rapid expansion of Mobile IP. Mobile IP uses wireless transmission medium, thereby making it subject to many security threats during various phases of route optimization. Modeling Mobile IP attacks reasonably and efficiently is the basis for defending against those attacks, which requires quantitative analysis and modeling approaches for expressing threat propagation in Mobile IP. In this Paper, we present four well-known Mobile IP attacks, such as Denial-of-Service (DoS) attack, bombing attack, redirection attack and replay attack and model them with Stochastic Game Petri Net (SGPN). Furthermore, we propose mixed strategy based defense strategies for the aforementioned attacks and model them with SGPN. Finally, we calculate the Nash Equilibrium of the attacker-defender game and thereby obtain the steady state probability of the vulnerable attack states. We show that, under the optimal strategy, an IDS needs to remain active 72.4%, 70%, 68.4% and 66.6% of the time to restrict the attacker's success rate to 8.5%, 6.4%, 7.2% and 8.3% respectively for the aforementioned attacks, thus performing better than the state-of-the-art approach.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Game theory ; Modelling ; Optimization ; Quantitative analysis ; Route optimization</subject><ispartof>arXiv.org, 2018-04</ispartof><rights>2018. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2072214775?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>780,784,25753,37012,44590</link.rule.ids></links><search><creatorcontrib>Talukder, Sajedul</creatorcontrib><creatorcontrib>Md Iftekharul Islam Sakib</creatorcontrib><creatorcontrib>Hossen, Md Faruk</creatorcontrib><creatorcontrib>Zahidur Rahim Talukder</creatorcontrib><creatorcontrib>Hossain, Md Shohrab</creatorcontrib><title>Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net</title><title>arXiv.org</title><description>The urging need for seamless connectivity in mobile environment has contributed to the rapid expansion of Mobile IP. Mobile IP uses wireless transmission medium, thereby making it subject to many security threats during various phases of route optimization. Modeling Mobile IP attacks reasonably and efficiently is the basis for defending against those attacks, which requires quantitative analysis and modeling approaches for expressing threat propagation in Mobile IP. In this Paper, we present four well-known Mobile IP attacks, such as Denial-of-Service (DoS) attack, bombing attack, redirection attack and replay attack and model them with Stochastic Game Petri Net (SGPN). Furthermore, we propose mixed strategy based defense strategies for the aforementioned attacks and model them with SGPN. Finally, we calculate the Nash Equilibrium of the attacker-defender game and thereby obtain the steady state probability of the vulnerable attack states. We show that, under the optimal strategy, an IDS needs to remain active 72.4%, 70%, 68.4% and 66.6% of the time to restrict the attacker's success rate to 8.5%, 6.4%, 7.2% and 8.3% respectively for the aforementioned attacks, thus performing better than the state-of-the-art approach.</description><subject>Game theory</subject><subject>Modelling</subject><subject>Optimization</subject><subject>Quantitative analysis</subject><subject>Route optimization</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNissKgkAUQIcgSMp_uNBaGK_aRLvoHRRC7WXSa47ZTDkj_X4u-oBW58A5A-ZhFIXBPEYcMd_amnOOM4FJEnnsuHRO5g8LUhewppK0JQtKw8ncVENwSBe9FtQofYePchVcnMkraZ3KYSefBCm5VsGZ3IQNS9lY8n8cs-l2c13tg1dr3h1Zl9Wma3WfMuQCMYyFSKL_ri8PbjtL</recordid><startdate>20180427</startdate><enddate>20180427</enddate><creator>Talukder, Sajedul</creator><creator>Md Iftekharul Islam Sakib</creator><creator>Hossen, Md Faruk</creator><creator>Zahidur Rahim Talukder</creator><creator>Hossain, Md Shohrab</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20180427</creationdate><title>Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net</title><author>Talukder, Sajedul ; Md Iftekharul Islam Sakib ; Hossen, Md Faruk ; Zahidur Rahim Talukder ; Hossain, Md Shohrab</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20722147753</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Game theory</topic><topic>Modelling</topic><topic>Optimization</topic><topic>Quantitative analysis</topic><topic>Route optimization</topic><toplevel>online_resources</toplevel><creatorcontrib>Talukder, Sajedul</creatorcontrib><creatorcontrib>Md Iftekharul Islam Sakib</creatorcontrib><creatorcontrib>Hossen, Md Faruk</creatorcontrib><creatorcontrib>Zahidur Rahim Talukder</creatorcontrib><creatorcontrib>Hossain, Md Shohrab</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Talukder, Sajedul</au><au>Md Iftekharul Islam Sakib</au><au>Hossen, Md Faruk</au><au>Zahidur Rahim Talukder</au><au>Hossain, Md Shohrab</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net</atitle><jtitle>arXiv.org</jtitle><date>2018-04-27</date><risdate>2018</risdate><eissn>2331-8422</eissn><abstract>The urging need for seamless connectivity in mobile environment has contributed to the rapid expansion of Mobile IP. Mobile IP uses wireless transmission medium, thereby making it subject to many security threats during various phases of route optimization. Modeling Mobile IP attacks reasonably and efficiently is the basis for defending against those attacks, which requires quantitative analysis and modeling approaches for expressing threat propagation in Mobile IP. In this Paper, we present four well-known Mobile IP attacks, such as Denial-of-Service (DoS) attack, bombing attack, redirection attack and replay attack and model them with Stochastic Game Petri Net (SGPN). Furthermore, we propose mixed strategy based defense strategies for the aforementioned attacks and model them with SGPN. Finally, we calculate the Nash Equilibrium of the attacker-defender game and thereby obtain the steady state probability of the vulnerable attack states. We show that, under the optimal strategy, an IDS needs to remain active 72.4%, 70%, 68.4% and 66.6% of the time to restrict the attacker's success rate to 8.5%, 6.4%, 7.2% and 8.3% respectively for the aforementioned attacks, thus performing better than the state-of-the-art approach.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2018-04 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2072214775 |
source | Access via ProQuest (Open Access) |
subjects | Game theory Modelling Optimization Quantitative analysis Route optimization |
title | Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T13%3A15%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Attacks%20and%20Defenses%20in%20Mobile%20IP:%20Modeling%20with%20Stochastic%20Game%20Petri%20Net&rft.jtitle=arXiv.org&rft.au=Talukder,%20Sajedul&rft.date=2018-04-27&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2072214775%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_20722147753%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2072214775&rft_id=info:pmid/&rfr_iscdi=true |