Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking

被引:4
|
作者
Hidouri, Abdelhak [1 ,2 ]
Touati, Haifa [1 ]
Hadded, Mohamed [3 ,4 ]
Hajlaoui, Nasreddine [1 ,5 ]
Muhlethaler, Paul [6 ]
Bouzefrane, Samia [7 ]
机构
[1] Univ Gabes, Hatem Bettahar IReSCoMath Res Lab, Gabes, Tunisia
[2] Univ Manouba, Natl Sch Comp Sci ENSI, Manouba, Tunisia
[3] Inst Res & Technol IRT SystemX, Paris, France
[4] Abu Dhabi Univ, Abu Dhabi, U Arab Emirates
[5] Qassim Univ, Appl Coll, Unit Sci Res, Unayzah, Saudi Arabia
[6] Natl Inst Res Digital Sci & Technol INRIA, Paris, France
[7] Conservatoire Natl Arts & Metiers Cnam, CEDR Lab, Paris, France
关键词
Named data networking; Cache pollution attack; Q-learning; SECURITY;
D O I
10.1016/j.comnet.2023.109998
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Cache Pollution Attack (CPA) is a recent threat that poses a significant risk to Named Data Networks (NDN). This attack can impact the caching process in various ways, such as causing increased cache misses for legitimate users, delays in data retrieval, and exhaustion of resources in NDN routers. Despite the numerous countermeasures suggested in the literature for CPA, many of them have detrimental effects on the NDN components. In this paper, we introduce Q-ICAN, a novel intelligent technique for detecting and mitigating cache pollution attacks in NDN. More specifically, Q-ICAN uses Q-Learning as an automated CPA prediction mechanism. Each NDN router integrates a reinforcement learning agent that utilizes impactful metrics such as the variation of the Cache Hit Ratio (CHR) and the interest inter-arrival time to learn how to differentiate between malicious and legitimate interests. We conducted several simulations using NDNSim to assess the effectiveness of our solution in terms of Cache Hit Ratio (CHR), Average Retrieval Delay (ARD) and multiple artificial intelligence evaluation metrics such as accuracy, precision, recall, etc. The obtained results confirm that Q-ICAN detects CPA attacks with a 95.09% accuracy rate, achieves a 94% CHR, and reduces ARD by 18%. Additionally, Q-ICAN adheres to the security policy of the NDN architecture and consumes fewer resources from NDN routers compared to existing state-of-the-art solutions.
引用
收藏
页数:18
相关论文
共 50 条
  • [11] Q-learning Approach in Ship Safety Inspection Data
    Huang, Tsan-Huang
    Huang, Yu-Chen
    Huang, Chao-Yi
    Fu, Shi-Yi
    BRIDGING THE EAST AND WEST: THEORIES AND PRACTICES OF TRANSPORTATION IN THE ASIA PACIFIC, 2016, : 229 - 235
  • [12] Q-learning based collaborative cache allocation in mobile edge computing
    Chien, Wei-Che
    Weng, Hung-Yen
    Lai, Chin-Feng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 603 - 610
  • [13] Q-learning based Reinforcement Learning Approach for Lane Keeping
    Feher, Arpad
    Aradi, Szilard
    Becsi, Tamas
    2018 18TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2018, : 31 - 35
  • [14] Energy-Efficient Underwater Data Collection: A Q-Learning Based Approach
    Haiyan Zhao
    Jing Yan
    Tao Wu
    Aihong Li
    Xiaoyuan Luo
    Journal of Marine Science and Application, 2022, 21 : 204 - 218
  • [15] Energy-Efficient Underwater Data Collection: A Q-Learning Based Approach
    Zhao, Haiyan
    Yan, Jing
    Wu, Tao
    Li, Aihong
    Luo, Xiaoyuan
    JOURNAL OF MARINE SCIENCE AND APPLICATION, 2022, 21 (03) : 204 - 218
  • [16] A novel contour extraction approach based on Q-learning
    Liang, Jun-Bin
    Xu, Jian-Min
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 3807 - +
  • [17] Optimal method for the generation of the attack path based on the Q-learning decision
    Li T.
    Cao S.
    Yin S.
    Wei D.
    Ma X.
    Ma J.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 160 - 167
  • [18] Sequential Node Attack of Complex Networks based on Q-learning Method
    Ma, Weijun
    Fang, Junyuan
    Wu, Jiajing
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [19] Optimal data injection attack design for spacecraft systems via a model free Q-learning approach
    Yuan, Huanhuan
    Wang, Mengbi
    Xi, Chao
    IET CONTROL THEORY AND APPLICATIONS, 2024, 18 (18): : 2841 - 2851
  • [20] Dynamic Attack Detection in IoT Networks: An Ensemble Learning Approach With Q-Learning and Explainable AI
    Turaka, Padmasri
    Panigrahy, Saroj Kumar
    IEEE ACCESS, 2024, 12 : 161925 - 161940