Mitigating Link-flooding Attacks in Intelligent Transportation System

被引:0
|
作者
Xia, Yu [1 ,2 ]
Liu, Ying [1 ,2 ]
Yin, Jianhui [1 ,2 ]
Li, Yikun [1 ]
Yu, Chengxiao [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] Peng Cheng Lab, Dept New Networks, Shenzhen, Peoples R China
基金
中国博士后科学基金;
关键词
Link Flooding Attack; Graph Neural Network; Network Telemetry;
D O I
10.1109/VTC2024-SPRING62846.2024.10683258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad hoc Network (VANET) is an important component of intelligent transportation systems. In VANET, nodes' high mobility and limited computing resources make it easy for them to be controlled by attackers to become botnets. Link flooding attack (LFA) is a new attack type that uses botnets to send legitimate low-speed traffic to flood critical links to cut off the target area, which poses new security risks for VANET. Therefore, the paper proposes an LFA mitigation scheme based on the programmable network architecture to improve security in VANETs. First, through the designed telemetry and early warning methods, the fine-grained network state can be efficiently obtained in real-time, and the link condition can be evaluated quickly. Afterward, the reroute scheduling policy for traffic is customized with the help of graph neural networks to reduce the pressure on critical links in time. The experiment shows that the scheme can rapidly mitigate LFA.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Detecting and Mitigating Target Link-Flooding Attacks Using SDN
    Wang, Juan
    Wen, Ru
    Li, Jiangqi
    Yan, Fei
    Zhao, Bo
    Yu, Fajiang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (06) : 944 - 956
  • [2] Woodpecker: Detecting and mitigating link-flooding attacks via SDN
    Wang, Lei
    Li, Qing
    Jiang, Yong
    Jia, Xuya
    Wu, Jianping
    COMPUTER NETWORKS, 2018, 147 : 1 - 13
  • [3] On the Interplay of Link-Flooding Attacks and Traffic Engineering
    Gkounis, Dimitrios
    Kotronis, Vasileios
    Liaskos, Christos
    Dimitropoulos, Xenofontas
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2016, 46 (02) : 5 - 11
  • [4] Efficient Detection of Link-Flooding Attacks with Deep Learning
    Hsieh, Chih-Hsiang
    Wang, Wei-Kuan
    Wang, Cheng-Xun
    Tsai, Shi-Chun
    Lin, Yi-Bing
    SUSTAINABILITY, 2021, 13 (22)
  • [5] Mitigating Link-Flooding Attack with Segment Rerouting in SDN
    Xie, Lixia
    Ding, Ying
    Yang, Hongyu
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 57 - 69
  • [6] Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things
    Ding, Xuyang
    Xiao, Feng
    Zhou, Man
    Wang, Zhibo
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 217 - 224
  • [7] RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm
    Rezapour, Amir
    Tzeng, Wen-Guey
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4052 - 4067
  • [8] Centralized defense using smart routing against link-flooding Attacks
    Belabed, Dallal
    Bouet, Mathieu
    Conan, Vania
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [9] CoDef: Collaborative Defense Against Large-Scale Link-Flooding Attacks
    Lee, Soo Bum
    Kang, Min Suk
    Gligor, Virgil D.
    PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13), 2013, : 417 - 427
  • [10] SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks
    Kang, Min Suk
    Gligor, Virgil D.
    Sekar, Vyas
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,