CAPTURING COLLUSIVE INTEREST FLOODING ATTACKS SIGNAL: A NOVEL MALAYSIA'S STATE NAMED-DATA NETWORKING TOPOLOGY (MY-NDN)

被引:0
|
作者
Lee, Ren-Ting [1 ]
Leau, Yu-Beng [2 ]
Park, Yong-Jin [2 ]
Anbar, Mohammed F. R. [3 ]
机构
[1] Univ Malaysia Sabah, Fac Comp & Informat, Knowledge Technol Res Unit Ind Dev, Jalan UMS, Kota Kinabalu 88400, Sabah, Malaysia
[2] Univ Malaysia Sabah, Fac Comp & Informat, Cybersecur Res Grp, Jalan UMS, Kota Kinabalu 88400, Sabah, Malaysia
[3] Univ Sains Malaysia, Sch Comp & Math Sci Bldg, Natl Adv IPv6 Ctr Excellence NAv6, George Town 11800, Malaysia
来源
JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY | 2022年 / 17卷 / 02期
关键词
Attack signals; CIFA; Collusive interest flooding attacks; Named-data networking; NDN;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Named-Data Networking (NDN) is a future Internet architecture known as the most innovative Information-centric Networking (ICN) system capable of resolving many traditional IP-based networking issues. To track suspicious and unsatisfied interests, much current research focuses on network threats such as Non-Collusive Interest Flooding Attacks (NCIFA) rather than Collusive Interest Flooding Attacks (CIFA). CIFA is an attack that aims to exhaust the Pending Interest Table (PIT) on a targeted NDN router by returning malicious Interest packets with matching data packets before the PIT entries that are running with a Malicious Data Producer. When the attacks are directed at satisfied interests, the entire process appears to be rational. Because the captured signals are very similar to legitimate requests, identifying CIFA is difficult. CIFA is ineligible for NCIFA's prevention and reduction strategies. We use the CIFA model to capture the CIFA signals, based on MY-NDN topology, through detailed simulation with ndnSIM simulator, because the test dataset and simulated signals for CIFA are unavailable. This paper provides a PIT Capacity, Performance, and Trendline comparison model for the NDN system, as well as an analysis of simulated CIFA signals. The PIT usage is kept below 100 entries, the throughput is kept below 500, and the trendline is not steep before an attack is launched. After the attack is launched, PIT usage remains above 180 entries and close to peak, throughput can be identified as being above 1000, and the trendline shows an exponential difference. This claims that an IFA-based attack will have an impact on the performance of the NDN network.
引用
收藏
页码:997 / 1009
页数:13
相关论文
共 3 条
  • [1] Mitigation measures of collusive interest flooding attacks in named data networking
    Wu, Zhijun
    Feng, Wenzhi
    Yue, Meng
    Xu, Xinran
    Liu, Liang
    COMPUTERS & SECURITY, 2020, 97
  • [2] Detection of Collusive Interest Flooding Attacks in Named Data Networking Using Wavelet Analysis
    Xin, Yonghui
    Li, Yang
    Wang, Wei
    Li, Weiyuan
    Chen, Xin
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 557 - 562
  • [3] A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking
    Benmoussa, Ahmed
    Tahari, Abdou el Karim
    Lagraa, Nasreddine
    Lakas, Abderrahmane
    Ahmad, Farhan
    Hussain, Rasheed
    Kerrache, Chaker Abdelaziz
    Kurugollu, Fatih
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,