Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks

被引:0
|
作者
Wang, Hanbo [1 ]
Man, Dapeng [1 ]
Han, Shuai [1 ]
Wang, Huanran [1 ]
Yang, Wu [1 ]
机构
[1] Harbin Engn Univ, Harbin, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Information distribution; Named data networking; Cache pollution attack; Quality of service; State transfer matrix; SECURITY;
D O I
10.1109/ICWS62655.2024.00075
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to the cache's capacity of forwarding information, Named Data Networking (NDN) has become a promising networking architecture. Since distributed caching is susceptible to cache pollution attacks (CPAs), researchers pay more attention to CPAs detection and defense. The current detection schemes seriously rely on an assumption that the content popularity remains stable over time. However, the change in interests of legitimate users in the network is unavoidable, which makes content popularity change dynamically. Thus, it is difficult to detect CPAs based on a static content popularity distribution. To address this issue, we propose a novel scheme to detect CPAs by analysing latency instead of popularity. The proposed scheme constructs the probability transfer matrix based on the Markov process of contents transfer and detects CPAs by the convergence states of the matrix. Once a CPA is detected, the affected router recognizes the attack type and adopts a specific defense method according to the attack type. This defense method can improve the network Quality of Service (QoS) by leveraging particular methods for different routers rather than the broadcasted global method. Extensive simulations in ndnSIM show that our scheme can effectively detect CPAs with higher detection ratio and defense CPAs with acceptable impacts on the overall network in network scenarios with dynamically changing content popularity.
引用
收藏
页码:545 / 556
页数:12
相关论文
共 50 条
  • [21] A Detection and Defense Approach for Content Privacy in Named Data Network
    Dogruluk, Ertugrul
    Costa, Antonio
    Macedo, Joaquim
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [22] Cache nFace: a simple countermeasure for the producer-consumer collusion attack in Named Data Networking
    Nasserala, Andre
    Bastos, Ian Vilar
    Moraes, Igor Monteiro
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (3-4) : 125 - 137
  • [23] Cache nFace: a simple countermeasure for the producer-consumer collusion attack in Named Data Networking
    André Nasserala
    Ian Vilar Bastos
    Igor Monteiro Moraes
    Annals of Telecommunications, 2019, 74 : 125 - 137
  • [24] Cache Management for Large Data Transfers in Named Data Networking using SDN
    Alhowaidi, Mohammad
    Nadig, Deepak
    Ramamurthy, Byrav
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [25] A QoS-aware Cache Replacement Policy for Vehicular Named Data Networks
    Khelifi, Hakima
    Luo, Senlin
    Nour, Boubakr
    Moungla, Hassine
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [26] Detection of Cache Pollution Attacks Using Randomness Checks
    Park, Hyundo
    Widjaja, Indra
    Lee, Heejo
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [27] A Survey on Detection and Mitigation of Interest Flooding Attack in Named Data Networking
    Rai, Sandesh
    Dhakal, Dependra
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 523 - 531
  • [28] Research on Detection Method of Interest Flooding Attack in Named Data Networking
    Xu, Yabin
    Gu, Peiyuan
    Xu, Xiaowei
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (01): : 113 - 127
  • [29] Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network
    Yao, Lin
    Li, Jia
    Deng, Jing
    Wu, Guowei
    COMPUTERS & SECURITY, 2023, 124
  • [30] Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET
    Yao, Lin
    Zheng, Zhaolong
    Wang, Xin
    Zeng, Yujie
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3287 - 3298