Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks

被引:27
作者
Yao, Lin [1 ,2 ]
Fan, Zhenzhen [1 ,3 ]
Deng, Jing [4 ]
Fan, Xin [1 ,2 ]
Wu, Guowei [1 ,3 ]
机构
[1] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116600, Peoples R China
[2] Dalian Univ Technol, DUT RU Int Sch Informat Sci & Engn, Dalian 116600, Peoples R China
[3] Dalian Univ Technol, Sch Software, Dalian 116600, Peoples R China
[4] Univ North Carolina Greensboro UNCG, Dept Comp Sci, Greensboro, NC 27412 USA
基金
中国国家自然科学基金;
关键词
Pollution; Fans; Clustering algorithms; Computer architecture; Partitioning algorithms; Classification algorithms; Resists; Cache pollution attack; clustering; named data networks;
D O I
10.1109/TDSC.2018.2876257
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Named Data Network (NDN), as a promising information-centric networking architecture, is expected to support next-generation of large-scale content distribution with open in-network cachings. However, such open in-network caches are vulnerable against Cache Pollution Attacks (CPAs) with the goal of filling cache storage with non-popular contents. The detection and defense against such attacks are especially difficult because of CPA's similarities with normal fluctuations of content requests. In this work, we use a clustering technique to detect and defend against CPAs. By clustering the content interests, our scheme is able to distinguish whether they have followed the Zipf-like distribution or not for accurate detections. Once any attack is detected, an attack table will be updated to record the abnormal requests. While such requests are still forwarded, the corresponding content chunks are not cached. Extensive simulations in ndnSIM demonstrate that our scheme can resist CPA effectively with higher cache hit, higher detecting ratio, lower hop count, and lower algorithm complexity compared to other state-of-the-art schemes.
引用
收藏
页码:1310 / 1321
页数:12
相关论文
共 28 条
[1]   A Survey of Security Attacks in Information-Centric Networking [J].
AbdAllah, Eslam G. ;
Hassanein, Hossam S. ;
Zulkernine, Mohammad .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1441-1454
[2]   A Survey of Information-Centric Networking [J].
Ahlgren, Bengt ;
Dannewitz, Christian ;
Imbrenda, Claudio ;
Kutscher, Dirk ;
Ohlman, Boerje .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) :26-36
[3]   Content-centric wireless networking: A survey [J].
Amadeo, Marica ;
Campolo, Claudia ;
Molinaro, Antonella ;
Ruggeri, Giuseppe .
COMPUTER NETWORKS, 2014, 72 :1-13
[4]  
[Anonymous], 2013, P IFIP NETW C
[5]  
[Anonymous], 2014, P WORKSH SEC EM NETW
[6]  
[Anonymous], 2015, Ann Data Sci, DOI DOI 10.1007/S40745-015-0040-1
[7]  
[Anonymous], 2012, TECH REP
[8]  
Breslau L, 1999, IEEE INFOCOM SER, P126, DOI 10.1109/INFCOM.1999.749260
[9]  
Compagno A, 2013, C LOCAL COMPUT NETW, P630, DOI 10.1109/LCN.2013.6761300
[10]   A lightweight mechanism for detection of cache pollution attacks in Named Data Networking [J].
Conti, Mauro ;
Gasti, Paolo ;
Teoli, Marco .
COMPUTER NETWORKS, 2013, 57 (16) :3178-3191