Research Article
DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective
Table 1
Notations and significance.
| Notations | Significance |
| | DDoS attacker | | Defender (SAG-SDN controller) | | Using attack-method-m | | Using defense-method-n | | Probability of using attack-method-m | | Probability of using defense-method-n | | Cost of using attack-method-m for attacker | | Cost of using defense-method-n for defender | | Utility of attack-method-m’s success | | Penalty for attacker after being detected | | Total resources of SAG-SDN controller | | Numbers of attack methods | | Utility of DDoS attacker | | Utility of defender | | Prior belief of defender about the type of network | | Correction of prior belief |
|
|