Detection of A Novel Dual Attack in Named Data Networking

被引:5
作者
Liu, Liang [1 ]
Peng, Silin [2 ]
机构
[1] Civil Aviat Univ China, Coll Safety Sci & Engn, Tianjin, Peoples R China
[2] Civil Aviat Univ China, Coll Elect Informat & Automat, Tianjin, Peoples R China
来源
2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM | 2022年
关键词
Distributed Denial of Service; Named Data Networking; Dual attack;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial of Service (DDoS) attacks in Named Data Networking (NDN), such as Cache Pollution Attacks (CPA) and Improved Collusive Interest Flooding Attacks (ICIFA), can significantly threaten the NDN network. However, most of the previous research has focused on the detection of a single attack by using Machine Learning algorithms and threshold-based methods, so the previous methods are not efficient enough for detecting dual attacks. This paper first proposes a dual attack by combining I-CIFA and CPA, and extracts the network traffic features, including the number of CacheMisses and the number of PIT entries. After analyzing the severe impact of the dual attack, a detection scheme BO-CatBoost is proposed based on Bayesian optimization and CatBoost. Finally, the experiment results show that the proposed detection scheme is robust in detecting the dual attack.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 23 条
[1]  
Afanasyev A., 2013, Imaging structural co-variance between human brain regions, P1
[2]  
Hamdane B, 2012, INT CONF NETW FUT, P114
[3]  
Hidouri A., 2021, P 2021 INT C SOFTWAR, P1
[4]  
Jie Zhou, 2021, Journal of Communications and Information Networks, V6, P91, DOI 10.23919/JCIN.2021.9387728
[5]   A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking [J].
Karami, Amin ;
Guerrero-Zapata, Mane .
NEUROCOMPUTING, 2015, 151 :1262-1282
[6]   A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks [J].
Karami, Amin ;
Guerrero-Zapata, Manel .
NEUROCOMPUTING, 2015, 149 :1253-1269
[7]  
Kumar Naveen, 2021, International Journal of Computers and Applications, V43, P537, DOI 10.1080/1206212X.2019.1583820
[8]   Preventing DDoS Flooding Attacks With Cryptographic Path Identifiers in Future Internet [J].
Luo, Hongbin ;
Liu, Zhoubiao ;
Zhang, Shan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02) :1690-1704
[9]  
Man D, 2021, CACHE POLLUTION DETE
[10]  
Mcleod M, 2017, PRACTICAL BAYESIAN O