International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 132

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013


A Defence Strategy against Flooding Attack Using Puzzles by Game Theory

Ch. V. N. Madhuri | R. V. Krishnaiah [7]


Abstract: Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources Takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of Defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources


Keywords: Dos Attacks, Game Theory, Puzzles


Edition: Volume 2 Issue 9, September 2013,


Pages: 234 - 237


How to Cite this Article?

Ch. V. N. Madhuri, R. V. Krishnaiah, "A Defence Strategy against Flooding Attack Using Puzzles by Game Theory", International Journal of Science and Research (IJSR), Volume 2 Issue 9, September 2013, pp. 234-237, https://www.ijsr.net/get_abstract.php?paper_id=07091301

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Dos Attacks'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame | Shrinivas Sonkar

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale | Deepali Gothawal [2]

Share this Article


Top