Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking

被引:0
作者
Li, Yue [1 ]
Liu, Yingjian [1 ,3 ]
Wang, Yu [2 ]
Guo, Zhongwen [1 ]
Yin, Haoyu [1 ]
Teng, Hao [1 ]
机构
[1] Ocean Univ China, Dept Comp Sci & Technol, Qingdao, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Univ North Carolina Charlotte, Dept Comp Sci, Charlotte, NC 28223 USA
来源
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS | 2020年
基金
中国国家自然科学基金;
关键词
Underwater Sensor Networks; Named Data Networking; Interest Flooding Attack; Denial-of-Service; SENSOR NETWORKS; POLLUTION ATTACKS; SECURITY;
D O I
10.1109/infocom41043.2020.9155371
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the harsh environment and energy limitation, maintaining efficient communication is crucial to the lifetime of Underwater Sensor Networks (UWSN). Named Data Networking (NDN), one of future network architectures, begins to be applied to UWSN. Although Underwater Named Data Networking (UNDN) performs well in data transmission, it still faces some security threats, such as the Denial-of-Service (DoS) attacks caused by Interest Flooding Attacks (IFAs). In this paper, we present a new type of DoS attacks, named as Synergetic Denial-of-Service (SDoS). Attackers synergize with each other, taking turns to reply to malicious interests as late as possible. SDoS attacks will damage the Pending Interest Table, Content Store, and Forwarding Information Base in routers with high concealment. Simulation results demonstrate that the SDoS attacks quadruple the increased network traffic compared with normal IFAs and the existing IFA detection algorithm in UNDN is completely invalid to SDoS attacks. In addition, we analyze the infection problem in UNDN and propose a defense method Trident based on carefully designed adaptive threshold, burst traffic detection, and attacker identification. Experiment results illustrate that Trident can effectively detect and resist both SDoS attacks and normal IFAs. Meanwhile, Trident can robustly undertake burst traffic and congestion.
引用
收藏
页码:1569 / 1578
页数:10
相关论文
共 38 条
[1]  
Afanasyev A., 2013, P IFIP NETW C
[2]  
[Anonymous], 2018, 2018 IEEE BIOM CIRC
[3]  
[Anonymous], 2016, OC 2016 MTSIEEE MONT
[4]  
Bouk S. H., 2017, P ACM S APPL COMP
[5]  
Compagno A, 2013, C LOCAL COMPUT NETW, P630, DOI 10.1109/LCN.2013.6761300
[6]  
Cui JH, 2006, IEEE NETWORK, V20, P12
[7]  
Dai H., 2014, P IEEE INFOCOM WORKS
[8]   Pollution attacks and defenses for Internet caching systems [J].
Deng, Leiwen ;
Gao, Yan ;
Chen, Yan ;
Kumanovic, Aleksandar .
COMPUTER NETWORKS, 2008, 52 (05) :935-956
[9]  
DiBenedetto S, 2016, IEEE CONF COMPUT
[10]   InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels [J].
Dong, Jiaqing ;
Wang, Kai ;
Lyu, Yongqiang ;
Jiao, Libo ;
Yin, Hao .
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 :527-537