Multi-classifier and meta-heuristic based cache pollution attacks and interest flooding attacks detection and mitigation model for named data networking

被引:1
|
作者
Buvanesvari, R. [1 ]
Joseph, Suresh K. [2 ]
机构
[1] Perunthalaivar Kamarajar Inst Engn & Technol, Dept Comp Sci & Engn, Karaikal, Puducherry, India
[2] Pondicherry Univ, Kalapet, Puducherry, India
关键词
NDN; DoS attack; convolutional neural network; optimisation; fuzzification; ROUTING SCHEME; MECHANISM; FRAMEWORK;
D O I
10.1080/0952813X.2022.2115141
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study's main goal is to provide a novel assault detection model with two phases. The features such node, distribution, pattern, frequency, and run time are extracted in the first phase. The Deep Convolutional Neural Network (CNN) is then used to detect cache pollution attacks (also known as content poisoning attacks), which include interest flooding for existing data, interest flooding for non-existing data, hijacking incoming interest packets, and signing data with the incorrect key. Similar to the first phase, the second phase involves extracting the aforementioned attributes and feeding them into a fuzzy decision tree (FDT) in order to identify an interest flooding attack. For accurate attack detection, this paper aims to optimise both DCNN and FDT classifiers. This work provided a fresh Decision Oriented Rider Optimisation Algorithm (DO-ROA), an enhancement of the traditional ROA, to address the optimisation problem. With regard to specific Type I and Type II performance measures, the suggested DO-ROA algorithm's performance is compared to that of other traditional models, demonstrating the superiority of the presented work.
引用
收藏
页码:839 / 864
页数:26
相关论文
共 8 条
  • [1] Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking
    Al-Share, Rama A.
    Shatnawi, Ahmed S.
    Al-Duwairi, Basheer
    IEEE ACCESS, 2022, 10 : 65996 - 66017
  • [2] A Survey on Detection and Mitigation of Interest Flooding Attack in Named Data Networking
    Rai, Sandesh
    Dhakal, Dependra
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 523 - 531
  • [3] IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things
    Bilgili, Sedat
    Demir, Alper Kamil
    Alam, Shahid
    INTERNET OF THINGS, 2024, 25
  • [4] RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking
    Buvanesvari, Ramachandira Moorthy
    Suresh Joseph, Kanagaraj
    IET NETWORKS, 2020, 9 (05) : 255 - 261
  • [5] CBIDM: Controller Based Intelligent Detection and Mitigation Approach for Interest Flooding Attack in Named Data Networking
    Naveen Kumar
    Abdul Aleem
    SN Computer Science, 5 (8)
  • [6] Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions
    Benmoussa, Ahmed
    Kerrache, Chaker Abdelaziz
    Lagraa, Nasreddine
    Mastorakis, Spyridon
    Lakas, Abderrahmane
    Tahari, Abdou El Karim
    ACM COMPUTING SURVEYS, 2023, 55 (07)
  • [7] Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
    Yao, Lin
    Zeng, Yujie
    Wang, Xin
    Chen, Ailun
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2848 - 2860
  • [8] CAPTURING COLLUSIVE INTEREST FLOODING ATTACKS SIGNAL: A NOVEL MALAYSIA'S STATE NAMED-DATA NETWORKING TOPOLOGY (MY-NDN)
    Lee, Ren-Ting
    Leau, Yu-Beng
    Park, Yong-Jin
    Anbar, Mohammed F. R.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (02): : 997 - 1009