Research Article

DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective

Algorithm 1 The optimal strategy selection algorithm for both sides in tt
Input: , , ,P,R, ,
Output: , //Optimal attack and defense strategies
begin
(1) {, , ,…, }//Attack type space
(2) {, , ,…, }//Defense type space
(3)Compute , //attacker and defender’s maximum benefits
(4)Output p {, , ,…, }//The attacker’s current round optimal mixed strategy set
(5)Output q {, , ,…, }//The defender’s current round optimal mixed strategy set
(6)Deploy ,
(7)Defender detection results //Check if an attack occurred. 0 did not occur. 1 did occur
(8)if  = = 1
(9) //Bayes’ rule is used to calculate the prior probability of the presence of attackers
(10)else
(11)
(12)end if
(13) //A transcendental belief correction, that is, the next round of defender’s transcendental belief
end