Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking

被引:4
|
作者
Hidouri, Abdelhak [1 ,2 ]
Touati, Haifa [1 ]
Hadded, Mohamed [3 ,4 ]
Hajlaoui, Nasreddine [1 ,5 ]
Muhlethaler, Paul [6 ]
Bouzefrane, Samia [7 ]
机构
[1] Univ Gabes, Hatem Bettahar IReSCoMath Res Lab, Gabes, Tunisia
[2] Univ Manouba, Natl Sch Comp Sci ENSI, Manouba, Tunisia
[3] Inst Res & Technol IRT SystemX, Paris, France
[4] Abu Dhabi Univ, Abu Dhabi, U Arab Emirates
[5] Qassim Univ, Appl Coll, Unit Sci Res, Unayzah, Saudi Arabia
[6] Natl Inst Res Digital Sci & Technol INRIA, Paris, France
[7] Conservatoire Natl Arts & Metiers Cnam, CEDR Lab, Paris, France
关键词
Named data networking; Cache pollution attack; Q-learning; SECURITY;
D O I
10.1016/j.comnet.2023.109998
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Cache Pollution Attack (CPA) is a recent threat that poses a significant risk to Named Data Networks (NDN). This attack can impact the caching process in various ways, such as causing increased cache misses for legitimate users, delays in data retrieval, and exhaustion of resources in NDN routers. Despite the numerous countermeasures suggested in the literature for CPA, many of them have detrimental effects on the NDN components. In this paper, we introduce Q-ICAN, a novel intelligent technique for detecting and mitigating cache pollution attacks in NDN. More specifically, Q-ICAN uses Q-Learning as an automated CPA prediction mechanism. Each NDN router integrates a reinforcement learning agent that utilizes impactful metrics such as the variation of the Cache Hit Ratio (CHR) and the interest inter-arrival time to learn how to differentiate between malicious and legitimate interests. We conducted several simulations using NDNSim to assess the effectiveness of our solution in terms of Cache Hit Ratio (CHR), Average Retrieval Delay (ARD) and multiple artificial intelligence evaluation metrics such as accuracy, precision, recall, etc. The obtained results confirm that Q-ICAN detects CPA attacks with a 95.09% accuracy rate, achieves a 94% CHR, and reduces ARD by 18%. Additionally, Q-ICAN adheres to the security policy of the NDN architecture and consumes fewer resources from NDN routers compared to existing state-of-the-art solutions.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] AFSndn: A novel adaptive forwarding strategy in named data networking based on Q-learning
    Mingchuan Zhang
    Xin Wang
    Tingting Liu
    Junlong Zhu
    Qingtao Wu
    Peer-to-Peer Networking and Applications, 2020, 13 : 1176 - 1184
  • [2] AFSndn: A novel adaptive forwarding strategy in named data networking based on Q-learning
    Zhang, Mingchuan
    Wang, Xin
    Liu, Tingting
    Zhu, Junlong
    Wu, Qingtao
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (04) : 1176 - 1184
  • [3] Mitigating Cache Pollution Attack Using Deep Learning in Named Data Networking (NDN)
    Hamdi, Mohd Maizan Fishol
    Chen, Zhiyuan
    Radenkovic, Milena
    INTELLIGENT COMPUTING, VOL 2, 2024, 2024, 1017 : 432 - 442
  • [4] Q-Learning Based Forwarding Strategy in Named Data Networks
    Hnaien, Hend
    Touati, Haifa
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2020, PT I, 2020, 12249 : 434 - 444
  • [5] Intelligent Forwarding Strategy for Congestion Control Using Q-Learning and LSTM in Named Data Networking
    Ryu, Sanguk
    Joe, Inwhee
    Kim, WonTae
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [6] Collaborative detection mechanism for low-rate cache pollution attack in named data networking
    Zhu, Yi
    Shi, Jia
    Gong, Pu
    Cao, Qing-Hua
    Su, Dong
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (06): : 44 - 48
  • [7] Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
    Yao, Lin
    Zeng, Yujie
    Wang, Xin
    Chen, Ailun
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2848 - 2860
  • [8] CBIDM: Controller Based Intelligent Detection and Mitigation Approach for Interest Flooding Attack in Named Data Networking
    Naveen Kumar
    Abdul Aleem
    SN Computer Science, 5 (8)
  • [9] An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
    Karami, Amin
    Guerrero-Zapata, Mane
    COMPUTER NETWORKS, 2015, 80 : 51 - 65
  • [10] Network Attack Path Selection and Evaluation Based on Q-Learning
    Wu, Runze
    Gong, Jinxin
    Tong, Weiyue
    Fan, Bing
    APPLIED SCIENCES-BASEL, 2021, 11 (01): : 1 - 13