Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks

被引:0
|
作者
Wang, Hanbo [1 ]
Man, Dapeng [1 ]
Han, Shuai [1 ]
Wang, Huanran [1 ]
Yang, Wu [1 ]
机构
[1] Harbin Engn Univ, Harbin, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Information distribution; Named data networking; Cache pollution attack; Quality of service; State transfer matrix; SECURITY;
D O I
10.1109/ICWS62655.2024.00075
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to the cache's capacity of forwarding information, Named Data Networking (NDN) has become a promising networking architecture. Since distributed caching is susceptible to cache pollution attacks (CPAs), researchers pay more attention to CPAs detection and defense. The current detection schemes seriously rely on an assumption that the content popularity remains stable over time. However, the change in interests of legitimate users in the network is unavoidable, which makes content popularity change dynamically. Thus, it is difficult to detect CPAs based on a static content popularity distribution. To address this issue, we propose a novel scheme to detect CPAs by analysing latency instead of popularity. The proposed scheme constructs the probability transfer matrix based on the Markov process of contents transfer and detects CPAs by the convergence states of the matrix. Once a CPA is detected, the affected router recognizes the attack type and adopts a specific defense method according to the attack type. This defense method can improve the network Quality of Service (QoS) by leveraging particular methods for different routers rather than the broadcasted global method. Extensive simulations in ndnSIM show that our scheme can effectively detect CPAs with higher detection ratio and defense CPAs with acceptable impacts on the overall network in network scenarios with dynamically changing content popularity.
引用
收藏
页码:545 / 556
页数:12
相关论文
共 50 条
  • [41] Detection of the False Data Injection Attack in Home Area Networks using ANN
    El Mrabet, Zakaria
    Selvaraj, Daisy Flora
    Nair, Aran Snkumaran
    Ranganathan, Prakash
    2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2019, : 176 - 181
  • [42] Structural crack damage detection using transfer matrix and state vector
    Nandakumar, P.
    Shankar, K.
    MEASUREMENT, 2015, 68 : 310 - 327
  • [43] Multi-classifier and meta-heuristic based cache pollution attacks and interest flooding attacks detection and mitigation model for named data networking
    Buvanesvari, R.
    Joseph, Suresh K.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (06) : 839 - 864
  • [44] The Defense Against ARP Spoofing Attack Using Semi-Static ARP Cache Table
    Data, Mahendra
    PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE INFORMATION ENGINEERING AND TECHNOLOGY (SIET 2018), 2018, : 206 - 210
  • [45] Defense and Detection of DDOS Attack Using Secured Geographic Routing
    Anandkumar, V
    Kalaiarasan, T. R.
    Ratheeshkumar, A. M.
    Thangadurai, N.
    INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH, 2022, 13 (02)
  • [46] Evaluating Machine Learning Algorithms for Detection of Interest Flooding Attack in Named Data Networking
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Srivastava, Shashank
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 299 - 302
  • [47] Cache-MAB: A reinforcement learning-based hybrid caching scheme in named data networks
    Iqbal, Shahid Md. Asif
    Asaduzzaman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 147 : 163 - 178
  • [48] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Naveen Kumar
    Shashank Srivastava
    Arabian Journal for Science and Engineering, 2024, 49 : 3241 - 3251
  • [49] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Kumar, Naveen
    Srivastava, Shashank
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3241 - 3251
  • [50] Transfer learning based attack detection for wireless communication networks
    Li, Sijia
    Pang, Jiali
    Wu, Qiang
    Yao, Na
    Yuan, Weiwei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (24):