Multi-classifier and meta-heuristic based cache pollution attacks and interest flooding attacks detection and mitigation model for named data networking

被引:1
|
作者
Buvanesvari, R. [1 ]
Joseph, Suresh K. [2 ]
机构
[1] Perunthalaivar Kamarajar Inst Engn & Technol, Dept Comp Sci & Engn, Karaikal, Puducherry, India
[2] Pondicherry Univ, Kalapet, Puducherry, India
关键词
NDN; DoS attack; convolutional neural network; optimisation; fuzzification; ROUTING SCHEME; MECHANISM; FRAMEWORK;
D O I
10.1080/0952813X.2022.2115141
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This study's main goal is to provide a novel assault detection model with two phases. The features such node, distribution, pattern, frequency, and run time are extracted in the first phase. The Deep Convolutional Neural Network (CNN) is then used to detect cache pollution attacks (also known as content poisoning attacks), which include interest flooding for existing data, interest flooding for non-existing data, hijacking incoming interest packets, and signing data with the incorrect key. Similar to the first phase, the second phase involves extracting the aforementioned attributes and feeding them into a fuzzy decision tree (FDT) in order to identify an interest flooding attack. For accurate attack detection, this paper aims to optimise both DCNN and FDT classifiers. This work provided a fresh Decision Oriented Rider Optimisation Algorithm (DO-ROA), an enhancement of the traditional ROA, to address the optimisation problem. With regard to specific Type I and Type II performance measures, the suggested DO-ROA algorithm's performance is compared to that of other traditional models, demonstrating the superiority of the presented work.
引用
收藏
页码:839 / 864
页数:26
相关论文
共 33 条
  • [1] Mitigation measures of collusive interest flooding attacks in named data networking
    Wu, Zhijun
    Feng, Wenzhi
    Yue, Meng
    Xu, Xinran
    Liu, Liang
    COMPUTERS & SECURITY, 2020, 97
  • [2] Cooperative detection and protection for Interest flooding attacks in named data networking
    Ding, Kun
    Liu, Yun
    Cho, Hsin-Hung
    Chao, Han-Chieh
    Shih, Timothy K.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (13) : 1968 - 1980
  • [3] A lightweight mechanism for detection of cache pollution attacks in Named Data Networking
    Conti, Mauro
    Gasti, Paolo
    Teoli, Marco
    COMPUTER NETWORKS, 2013, 57 (16) : 3178 - 3191
  • [4] MSIDN: Mitigation of Sophisticated Interest flooding-based DDoS attacks in Named Data Networking
    Benmoussa, Ahmed
    Tahari, Abdou el Karim
    Kerrache, Chaker Abdelaziz
    Lagraa, Nasreddine
    Lakas, Abderrahmane
    Hussain, Rasheed
    Ahmad, Farhan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 293 - 306
  • [5] Detection of Interest Flooding Attacks in Named Data Networking using Hypothesis Testing
    Nguyen, Tan N.
    Cogranne, Remi
    Doyen, Guillaume
    Retraint, Florent
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [6] Advanced Interest Flooding Attacks in Named-Data Networking
    Signorello, Salvatore
    Marchal, Samuel
    Francois, Jerome
    Festor, Olivier
    State, Radu
    2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 1 - 10
  • [7] Detection of Collusive Interest Flooding Attacks in Named Data Networking Using Wavelet Analysis
    Xin, Yonghui
    Li, Yang
    Wang, Wei
    Li, Weiyuan
    Chen, Xin
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 557 - 562
  • [8] Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
    Compagno, Alberto
    Conti, Mauro
    Gasti, Paolo
    Tsudik, Gene
    PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2013), 2013, : 630 - +
  • [9] Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking
    Al-Share, Rama A.
    Shatnawi, Ahmed S.
    Al-Duwairi, Basheer
    IEEE ACCESS, 2022, 10 : 65996 - 66017
  • [10] An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
    Karami, Amin
    Guerrero-Zapata, Mane
    COMPUTER NETWORKS, 2015, 80 : 51 - 65