Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking

被引:4
作者
Hidouri, Abdelhak [1 ,2 ]
Touati, Haifa [1 ]
Hadded, Mohamed [3 ,4 ]
Hajlaoui, Nasreddine [1 ,5 ]
Muhlethaler, Paul [6 ]
Bouzefrane, Samia [7 ]
机构
[1] Univ Gabes, Hatem Bettahar IReSCoMath Res Lab, Gabes, Tunisia
[2] Univ Manouba, Natl Sch Comp Sci ENSI, Manouba, Tunisia
[3] Inst Res & Technol IRT SystemX, Paris, France
[4] Abu Dhabi Univ, Abu Dhabi, U Arab Emirates
[5] Qassim Univ, Appl Coll, Unit Sci Res, Unayzah, Saudi Arabia
[6] Natl Inst Res Digital Sci & Technol INRIA, Paris, France
[7] Conservatoire Natl Arts & Metiers Cnam, CEDR Lab, Paris, France
关键词
Named data networking; Cache pollution attack; Q-learning; SECURITY;
D O I
10.1016/j.comnet.2023.109998
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Cache Pollution Attack (CPA) is a recent threat that poses a significant risk to Named Data Networks (NDN). This attack can impact the caching process in various ways, such as causing increased cache misses for legitimate users, delays in data retrieval, and exhaustion of resources in NDN routers. Despite the numerous countermeasures suggested in the literature for CPA, many of them have detrimental effects on the NDN components. In this paper, we introduce Q-ICAN, a novel intelligent technique for detecting and mitigating cache pollution attacks in NDN. More specifically, Q-ICAN uses Q-Learning as an automated CPA prediction mechanism. Each NDN router integrates a reinforcement learning agent that utilizes impactful metrics such as the variation of the Cache Hit Ratio (CHR) and the interest inter-arrival time to learn how to differentiate between malicious and legitimate interests. We conducted several simulations using NDNSim to assess the effectiveness of our solution in terms of Cache Hit Ratio (CHR), Average Retrieval Delay (ARD) and multiple artificial intelligence evaluation metrics such as accuracy, precision, recall, etc. The obtained results confirm that Q-ICAN detects CPA attacks with a 95.09% accuracy rate, achieves a 94% CHR, and reduces ARD by 18%. Additionally, Q-ICAN adheres to the security policy of the NDN architecture and consumes fewer resources from NDN routers compared to existing state-of-the-art solutions.
引用
收藏
页数:18
相关论文
共 54 条
  • [1] Hybrid 802.11p-cellular architecture for NDN-based VANET
    Aboud, Ahmed
    Touati, Haifa
    Hnich, Brahim
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (03)
  • [2] Efficient forwarding strategy in a NDN-based internet of things
    Aboud, Ahmed
    Touati, Haifa
    Hnich, Brahim
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (03): : 805 - 818
  • [3] Aboud A, 2016, I C COMP SYST APPLIC
  • [4] Abudaqa A.A., 2020, APPL SCI
  • [5] Q-Learning for Securing Cyber-Physical Systems : A survey
    Alabadi, Montdher
    Albayrak, Zafer
    [J]. 2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, : 545 - 557
  • [6] [Anonymous], Cisco annual Internet report (2018-2023)
  • [7] [Anonymous], 2023, NDN COMM M 2023
  • [8] The Emerging of Named Data Networking: Architecture, Application, and Technology
    Azamuddin, Wan Muhammad Hazwan
    Aman, Azana Hafizah Mohd
    Sallehuddin, Hasimi
    Abualsaud, Khalid
    Mansor, Norhisham
    [J]. IEEE ACCESS, 2023, 11 : 23620 - 23633
  • [9] Dynamic forest of random subsets-based one-time signature-based capability enhancing security architecture for named data networking
    Babu V.J.
    Jose M.V.
    [J]. International Journal of Information Technology, 2023, 15 (2) : 773 - 788
  • [10] Identifying P2P traffic: A survey
    Bhatia, Max
    Rai, Mritunjay Kumar
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (05) : 1182 - 1203