A Radial Basis Function Neural Network-based Detection Method for Collusive Interest Flooding Attacks in Named Data Networks

被引:0
|
作者
Li, Wenlu [1 ]
Xing, Guanglin [1 ]
Ran, Ran [2 ]
Hou, Rui [1 ]
机构
[1] South Cent Minzu Univ, Coll Comp Sci, Wuhan, Peoples R China
[2] Univ Sydney, Sch Comp Sci, Sydney, NSW, Australia
基金
中国国家自然科学基金;
关键词
Named data network; Collusive interest flooding attack; RBF neural network algorithm;
D O I
10.1145/3663408.3665819
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Named Data Networks (NDNs), the Collusive Interest Flooding Attack (CIFA) is a new variant of the Interest Flooding Attack (IFA). Due to the low-rate intermittency of a CIFA, it is more stealthy and deceptive than an IFA, posing challenges for most IFA detection schemes to effectively differentiate between normal and anomalous traffic. The use of machine learning algorithms to identify the characteristics of network traffic makes it possible to more accurately distinguish between normal network behavior and attacks. Based on this, to better detect CIFAs, we propose a Radial Basis Function (RBF) neural network-based scheme that can quickly detect CIFAs by identifying network traffic features and classifying them using an RBF neural network algorithm. The results show that the method has better detection performance than classical detection methods.
引用
收藏
页码:206 / 208
页数:3
相关论文
共 50 条
  • [1] Detection of Collusive Interest Flooding Attacks in Named Data Networking Using Wavelet Analysis
    Xin, Yonghui
    Li, Yang
    Wang, Wei
    Li, Weiyuan
    Chen, Xin
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 557 - 562
  • [2] Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking
    Al-Share, Rama A.
    Shatnawi, Ahmed S.
    Al-Duwairi, Basheer
    [J]. IEEE ACCESS, 2022, 10 : 65996 - 66017
  • [3] Mitigation measures of collusive interest flooding attacks in named data networking
    Wu, Zhijun
    Feng, Wenzhi
    Yue, Meng
    Xu, Xinran
    Liu, Liang
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [4] The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN
    Liu, Liang
    Feng, Wenzhi
    Wu, Zhijun
    Yue, Meng
    Zhang, Rudan
    [J]. IEEE ACCESS, 2020, 8 : 128005 - 128017
  • [5] Evaluating pending interest table performance under the collusive interest flooding attack in named data networks
    Lopes, Diego Canizio
    Nasserala, Andre
    Bastos, Ian Vilar
    Moraes, Igor Monteiro
    [J]. ANNALS OF TELECOMMUNICATIONS, 2024, 79 (7-8) : 475 - 486
  • [6] Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
    Hou, Rui
    Han, Min
    Chen, Jing
    Hu, Wenbin
    Tan, Xiaobin
    Luo, Jiangtao
    Ma, Maode
    [J]. IEEE NETWORK, 2019, 33 (03): : 116 - 121
  • [7] Cooperative detection and protection for Interest flooding attacks in named data networking
    Ding, Kun
    Liu, Yun
    Cho, Hsin-Hung
    Chao, Han-Chieh
    Shih, Timothy K.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (13) : 1968 - 1980
  • [8] An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks
    Shi, Zhihao
    Xu, Yaozong
    Ma, Maode
    Zhang, Yanan
    [J]. ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 158 - 167
  • [9] RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking
    Buvanesvari, Ramachandira Moorthy
    Suresh Joseph, Kanagaraj
    [J]. IET NETWORKS, 2020, 9 (05) : 255 - 261
  • [10] Detection of Interest Flooding Attacks in Named Data Networking using Hypothesis Testing
    Nguyen, Tan N.
    Cogranne, Remi
    Doyen, Guillaume
    Retraint, Florent
    [J]. 2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,