Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks

被引:0
|
作者
Wang, Hanbo [1 ]
Man, Dapeng [1 ]
Han, Shuai [1 ]
Wang, Huanran [1 ]
Yang, Wu [1 ]
机构
[1] Harbin Engn Univ, Harbin, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Information distribution; Named data networking; Cache pollution attack; Quality of service; State transfer matrix; SECURITY;
D O I
10.1109/ICWS62655.2024.00075
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to the cache's capacity of forwarding information, Named Data Networking (NDN) has become a promising networking architecture. Since distributed caching is susceptible to cache pollution attacks (CPAs), researchers pay more attention to CPAs detection and defense. The current detection schemes seriously rely on an assumption that the content popularity remains stable over time. However, the change in interests of legitimate users in the network is unavoidable, which makes content popularity change dynamically. Thus, it is difficult to detect CPAs based on a static content popularity distribution. To address this issue, we propose a novel scheme to detect CPAs by analysing latency instead of popularity. The proposed scheme constructs the probability transfer matrix based on the Markov process of contents transfer and detects CPAs by the convergence states of the matrix. Once a CPA is detected, the affected router recognizes the attack type and adopts a specific defense method according to the attack type. This defense method can improve the network Quality of Service (QoS) by leveraging particular methods for different routers rather than the broadcasted global method. Extensive simulations in ndnSIM show that our scheme can effectively detect CPAs with higher detection ratio and defense CPAs with acceptable impacts on the overall network in network scenarios with dynamically changing content popularity.
引用
收藏
页码:545 / 556
页数:12
相关论文
共 50 条
  • [31] Towards Multi-metric Cache Replacement Policies in Vehicular Named Data Networks
    Ostrovskaya, Svetlana
    Surnin, Oleg
    Hussain, Rasheed
    Bouk, Safdar Hussain
    Lee, JooYoung
    Mehran, Narges
    Ahmed, Syed Hassan
    Benslimane, Abderrahim
    2018 IEEE 29TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2018,
  • [32] Adversarial Transfer for Named Entity Boundary Detection with Pointer Networks
    Li, Jing
    Ye, Deheng
    Shang, Shuo
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 5053 - 5059
  • [33] Integrity Attack Detection in PMU Networks Using Static State Estimation Algorithm
    Dehghani, Maryam
    Khalafi, Zahra
    Khalili, Abdullah
    Sami, Ashkan
    2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [34] A False Data Injection Attack Detection Strategy for Unbalanced Distribution Networks State Estimation
    Wei, Shuheng
    Xu, Junjun
    Wu, Zaijun
    Hu, Qinran
    Yu, Xinghuo
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (05) : 3992 - 4006
  • [35] A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking
    Magsi, Arif Hussain
    Yovita, Leanna Vidya
    Ghulam, Ali
    Muhammad, Ghulam
    Ali, Zulfiqar
    SUSTAINABILITY, 2023, 15 (14)
  • [36] Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking
    Tan Nguyen
    Hoang-Long Mai
    Cogranne, Remi
    Doyen, Guillaume
    Mallouli, Wissam
    Luong Nguyen
    El Aoun, Moustapha
    de Oca, Edgardo Montes
    Festor, Olivier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) : 2470 - 2485
  • [37] Monitoring ARP Attack Using Responding Time and State ARP Cache
    Wang, Zhenqi
    Zhou, Yu
    SIXTH INTERNATIONAL SYMPOSIUM ON NEURAL NETWORKS (ISNN 2009), 2009, 56 : 701 - 709
  • [38] Mitigating the Cache Data Pollution by Using Branch Path Tracking
    Liu Song-He
    Song Huan-Sheng
    Qi Shu-Min
    Zhang Jun
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 574 - 578
  • [39] FEC Driven Network Coding Based Pollution Attack Defense in Cognitive Radio Networks
    Demirdogen, Ibrahim
    Li, Lei
    Chigan, Chunxiao
    2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2015, : 259 - 264
  • [40] DoS Attack Detection in VANET using Transfer Learning Approach for BSM Data
    Shahid, Muhammad Anwar
    Jaekel, Arunita
    Zhang, Ning
    Allsopp, Tim
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 748 - 753