Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks

被引:0
|
作者
Wang, Hanbo [1 ]
Man, Dapeng [1 ]
Han, Shuai [1 ]
Wang, Huanran [1 ]
Yang, Wu [1 ]
机构
[1] Harbin Engn Univ, Harbin, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Information distribution; Named data networking; Cache pollution attack; Quality of service; State transfer matrix; SECURITY;
D O I
10.1109/ICWS62655.2024.00075
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to the cache's capacity of forwarding information, Named Data Networking (NDN) has become a promising networking architecture. Since distributed caching is susceptible to cache pollution attacks (CPAs), researchers pay more attention to CPAs detection and defense. The current detection schemes seriously rely on an assumption that the content popularity remains stable over time. However, the change in interests of legitimate users in the network is unavoidable, which makes content popularity change dynamically. Thus, it is difficult to detect CPAs based on a static content popularity distribution. To address this issue, we propose a novel scheme to detect CPAs by analysing latency instead of popularity. The proposed scheme constructs the probability transfer matrix based on the Markov process of contents transfer and detects CPAs by the convergence states of the matrix. Once a CPA is detected, the affected router recognizes the attack type and adopts a specific defense method according to the attack type. This defense method can improve the network Quality of Service (QoS) by leveraging particular methods for different routers rather than the broadcasted global method. Extensive simulations in ndnSIM show that our scheme can effectively detect CPAs with higher detection ratio and defense CPAs with acceptable impacts on the overall network in network scenarios with dynamically changing content popularity.
引用
收藏
页码:545 / 556
页数:12
相关论文
共 50 条
  • [1] Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks
    Yao, Lin
    Fan, Zhenzhen
    Deng, Jing
    Fan, Xin
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1310 - 1321
  • [2] A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture
    Hidouri, Abdelhak
    Touati, Haifa
    Hadded, Mohamed
    Hajlaoui, Nasreddine
    Muhlethaler, Paul
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 : 435 - 446
  • [3] Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
    Yao, Lin
    Zeng, Yujie
    Wang, Xin
    Chen, Ailun
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2848 - 2860
  • [4] Mitigating Cache Pollution Attack Using Deep Learning in Named Data Networking (NDN)
    Hamdi, Mohd Maizan Fishol
    Chen, Zhiyuan
    Radenkovic, Milena
    INTELLIGENT COMPUTING, VOL 2, 2024, 2024, 1017 : 432 - 442
  • [5] Collaborative detection mechanism for low-rate cache pollution attack in named data networking
    Zhu, Yi
    Shi, Jia
    Gong, Pu
    Cao, Qing-Hua
    Su, Dong
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (06): : 44 - 48
  • [6] A lightweight mechanism for detection of cache pollution attacks in Named Data Networking
    Conti, Mauro
    Gasti, Paolo
    Teoli, Marco
    COMPUTER NETWORKS, 2013, 57 (16) : 3178 - 3191
  • [7] Detection and Defense Schemes for Cache Pollution Attack in Content-Centric Network
    Cao, Yang
    Wu, Disheng
    Hu, Mingrui
    Chen, Shu
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 614 - 629
  • [8] Request pattern change-based cache pollution attack detection and defense in edge computing
    Wang, Junwei
    Wei, Xianglin
    Fan, Jianhua
    Duan, Qiang
    Liu, Jianwei
    Wang, Yangang
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (05) : 1212 - 1220
  • [9] Request pattern change-based cache pollution attack detection and defense in edge computing
    Junwei Wang
    Xianglin Wei
    Jianhua Fan
    Qiang Duan
    Jianwei Liu
    Yangang Wang
    Digital Communications and Networks, 2023, 9 (05) : 1212 - 1220
  • [10] Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking
    Hidouri, Abdelhak
    Touati, Haifa
    Hadded, Mohamed
    Hajlaoui, Nasreddine
    Muhlethaler, Paul
    Bouzefrane, Samia
    COMPUTER NETWORKS, 2023, 235