{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T11:54:42Z","timestamp":1767182082197,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100019642","name":"State Key Laboratory of Integrated Services Networks","doi-asserted-by":"publisher","award":["ISN22-13","201802007013"],"award-info":[{"award-number":["ISN22-13","201802007013"]}],"id":[{"id":"10.13039\/501100019642","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005320","name":"Xidian University","doi-asserted-by":"publisher","award":["ISN22-13","201802007013"],"award-info":[{"award-number":["ISN22-13","201802007013"]}],"id":[{"id":"10.13039\/501100005320","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["ISN22-13","201802007013"],"award-info":[{"award-number":["ISN22-13","201802007013"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,1,7]]},"abstract":"<jats:p>The centralized management of Software-Defined Network (SDN) brings convenience to Space-Air-Ground Integrated Networks (SAGIN), which also makes it vulnerable to Distributed Denial of Service (DDoS). At present, the popular detection methods are based on machine learning, but most of them are fixed detection strategies with high overhead and real-time control, so the efficiency is not high. This paper designs different defense methods for different DDoS attacks and constructs a multitype DDoS defense model based on a dynamic Bayesian game in the Software-Defined Space-Air-Ground Integrated Networks (SD-SAGIN). The proposed game model\u2019s Nash equilibrium is solved based on the different costs and payoffs of each method. We simulated the attack and defense of DDoS in Ryu controller and Mininet. The results show that, under our model, the attacker and defender\u2019s strategies are in a dynamic balance, and the controller can effectively reduce the defense cost while ensuring detection accuracy. Compared with the existing traditional Support Vector Machine (SVM) defense method, the performance of the proposed method is better, and it provides one of the references for DDoS defense in SD-SAGIN.<\/jats:p>","DOI":"10.1155\/2022\/1886516","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T04:20:08Z","timestamp":1641615608000},"page":"1-13","source":"Crossref","is-referenced-by-count":4,"title":["DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1131-6046","authenticated-orcid":true,"given":"Zhaobin","family":"Li","sequence":"first","affiliation":[{"name":"Communication Engineering Department, Beijing Electronics Science and Technology Institute, Beijing 100070, China"},{"name":"The State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710126, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0353-0432","authenticated-orcid":true,"given":"Bin","family":"Yang","sequence":"additional","affiliation":[{"name":"Communication Engineering Department, Beijing Electronics Science and Technology Institute, Beijing 100070, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9167-3870","authenticated-orcid":true,"given":"Xinyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Communication Engineering Department, Beijing Electronics Science and Technology Institute, Beijing 100070, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6426-6794","authenticated-orcid":true,"given":"Chao","family":"Guo","sequence":"additional","affiliation":[{"name":"Communication Engineering Department, Beijing Electronics Science and Technology Institute, Beijing 100070, China"},{"name":"The State Key Laboratory of Integrated Services Networks, Xidian University, Xi\u2019an 710126, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2018.1800365"},{"issue":"P2","key":"2","first-page":"95","article-title":"SDN\/NFV-enabled satellite communications networks: opportunities, scenarios and challenges","volume":"18","author":"R. Ferr\u00fas","year":"2015","journal-title":"Physical Communication"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1759"},{"first-page":"1","article-title":"Defending DDoS against software defined networks using entropy","author":"R. Swami","key":"4"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/vitecon.2019.8899721"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2950945"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2019.8761580"},{"first-page":"152","article-title":"Enhanced DDoS detection using hybrid genetic algorithm and decision tree for SDN","author":"P. Preamthaisong","key":"8"},{"first-page":"1","article-title":"Deep learning based ensemble convolutional neural network solution for distributed denial of service detection in SDNs","author":"S. Haider","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.23919\/jcc.2019.07.012"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/isdfs.2019.8757542"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.06173"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2702341"},{"issue":"3","key":"14","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1109\/JIOT.2020.3011521","article-title":"A scalable and energy-efficient anomaly detection scheme in wireless SDN-based mMTC networks for IoT","volume":"8","author":"B. Wang","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2917912"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3040998"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2924968"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3039975"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3041641"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3007218"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.09788"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/1886516.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/1886516.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/1886516.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T04:20:16Z","timestamp":1641615616000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/1886516\/"}},"subtitle":[],"editor":[{"given":"Zhen","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,7]]},"references-count":21,"alternative-id":["1886516","1886516"],"URL":"https:\/\/doi.org\/10.1155\/2022\/1886516","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2022,1,7]]}}}