Research on Pending Interest Table of Named Data Networking Supporting Interest Flooding Attack Detection

被引:0
|
作者
Peng P. [1 ]
Li Z. [1 ]
Liang J.-F. [2 ]
Ma T.-X. [2 ]
Liu K.-H. [1 ]
机构
[1] School of Microelectronics, Tianjin University, Tianjin
[2] Electric Power Research Institute, Hebei Electric Power Corporation, Shijiazhuang
关键词
Character convolutional neural network; Interest flooding attack; Name lookup; Named data networking; Pending interest table;
D O I
10.13190/j.jbupt.2020-131
中图分类号
学科分类号
摘要
In order to solve the problems of efficient variable-length name lookup, hardware-supportable storage consumption, and detection of interest flooding attack in the pending interest table(PIT) of named data networking, an cognition and indexing model(C&I) based on character convolutional neural network is proposed. C&I can support the classification and aggregation of name data, and reduce the storage consumption of name data. At the same time, a pending interest table storage structure C&I-PIT based on C&I and its data retrieval algorithm, which supports the detection of interest flooding attack, is proposed. Through the deployment of multi-level memory, the index structure and storage space are respectively deployed on static random access memory and dynamic random access memory. Experiments show that C&I-PIT has good performance in name aggregation, memory consumption and interest flooding attack detection. © 2021, Editorial Department of Journal of Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:61 / 67
页数:6
相关论文
共 12 条
  • [1] Wang Ying, Fei Zixuan, Zhang Xiangyang, Et al., Survey on caching technology in mobile edge networks, Journal of Beijing University of Posts and Telecommunications, 40, 6, pp. 1-13, (2017)
  • [2] Yan Kun, Zhao Yan, Analysis of the development trend of IoT terminals in the "Internet+" era, Technology and Economic Guide, 28, 2, (2020)
  • [3] Zhang L, Estrin D, Burke J, Et al., Named data networking (NDN) project NDN-0001 [EB/OL]
  • [4] Huang Kun, Wang Zhaohua, A hybrid approach to scalable name prefix lookup, 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), pp. 1-10, (2018)
  • [5] Li Zhuo, Liu Kaihua, Zhao Yang, Et al., MaPIT: an enhanced pending interest table for NDN with mapping bloom filter, IEEE Communications Letters, 18, 11, pp. 1915-1918, (2014)
  • [6] Yan Liu, Li Zhuo, Liu Kaihua, Learning tree: neural network-based index for NDN forwarding plane, ACM SIGCOMM 2019 Conference Posters and Demos, pp. 63-65, (2019)
  • [7] Gasti P, Tsudik G, Uzun E, Et al., DoS and DDoS in named data networking, 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1-7, (2013)
  • [8] Wang Kai, Bao Wei, Wang Yingjie, Et al., Evaluating and mitigating malicious data aggregates in named data networking, KSII Transactions on Internet & Information Systems, 11, 9, pp. 4641-4657, (2017)
  • [9] Shinohara R, Kamimoto T, Sato K, Et al., Cache control method mitigating packet concentration of router caused by interest flooding attack, 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 324-331, (2016)
  • [10] Yi C, Afanasyev A, Wang L, Et al., Adaptive forwarding in named data networking, ACM SIGCOMM Computer Communication Review, 42, 3, pp. 62-67, (2012)