Mitigation measures of collusive interest flooding attacks in named data networking

被引:20
作者
Wu, Zhijun [1 ]
Feng, Wenzhi [1 ]
Yue, Meng [1 ]
Xu, Xinran [1 ]
Liu, Liang [1 ]
机构
[1] Civil Aviat Univ China, Sch Elect & Informat & Automat, Tianjin 300300, Peoples R China
基金
中国国家自然科学基金;
关键词
Named data networking; Collusive interest flooding attack; PIT entries; Mitigation strateg;
D O I
10.1016/j.cose.2020.101971
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Collusive interest flooding attack (CIFA) is a new type of denial of service (DoS) attack against named data networking (NDN). It evolved on the basis of interest flooding attack (IFA), which has a great adverse effect on network traffic. With the help of the collusive producer, CIFA attack can evade existing detection and defense mechanisms through low-rate attack mode. By analyzing the impact of CIFA attacks on network traffic and related attributes of PIT entries, the detection scheme based on combination of rolling time window algorithm and confidence interval is proposed. The scheme detects the network status in real time by dynamically adjusting the normal network baseline. It can solve the problems of low detection rate and high false alarm rate of the existing detection algorithms for CIFA attacks. Finally, the malicious impact of the CIFA attack on the network is reduced through the management of the PIT space. Experimental results show that this approach can effectively improve the number of data packets received by legitimate users and the overall service quality of the network in a short time. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 24 条
[1]   A Survey of Security Attacks in Information-Centric Networking [J].
AbdAllah, Eslam G. ;
Hassanein, Hossam S. ;
Zulkernine, Mohammad .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1441-1454
[2]  
Afanasyev A., 2013, 2013 IFIP NETW C, P1
[3]  
[Anonymous], 2013 22 INT C COMPUT
[4]  
Chen J., 2019, 2019 2 INT C HOT INF
[5]  
Compagno A, 2013, C LOCAL COMPUT NETW, P630, DOI 10.1109/LCN.2013.6761300
[6]  
Cong Suo, 2003, Journal of China Institute of Communications, V24, P43
[7]   Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks [J].
Hou, Rui ;
Han, Min ;
Chen, Jing ;
Hu, Wenbin ;
Tan, Xiaobin ;
Luo, Jiangtao ;
Ma, Maode .
IEEE NETWORK, 2019, 33 (03) :116-121
[8]  
Hu Jun, 2007, Journal of Computer Applications, V27, P2659
[9]  
[李校林 Li Xiaolin], 2019, [计算机应用研究, Application Research of Computers], V36, P3833
[10]  
Nguyen N.T., 2016, IEEE INT WORKSH INF, P557