Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking

被引:4
|
作者
Hidouri, Abdelhak [1 ,2 ]
Touati, Haifa [1 ]
Hadded, Mohamed [3 ,4 ]
Hajlaoui, Nasreddine [1 ,5 ]
Muhlethaler, Paul [6 ]
Bouzefrane, Samia [7 ]
机构
[1] Univ Gabes, Hatem Bettahar IReSCoMath Res Lab, Gabes, Tunisia
[2] Univ Manouba, Natl Sch Comp Sci ENSI, Manouba, Tunisia
[3] Inst Res & Technol IRT SystemX, Paris, France
[4] Abu Dhabi Univ, Abu Dhabi, U Arab Emirates
[5] Qassim Univ, Appl Coll, Unit Sci Res, Unayzah, Saudi Arabia
[6] Natl Inst Res Digital Sci & Technol INRIA, Paris, France
[7] Conservatoire Natl Arts & Metiers Cnam, CEDR Lab, Paris, France
关键词
Named data networking; Cache pollution attack; Q-learning; SECURITY;
D O I
10.1016/j.comnet.2023.109998
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Cache Pollution Attack (CPA) is a recent threat that poses a significant risk to Named Data Networks (NDN). This attack can impact the caching process in various ways, such as causing increased cache misses for legitimate users, delays in data retrieval, and exhaustion of resources in NDN routers. Despite the numerous countermeasures suggested in the literature for CPA, many of them have detrimental effects on the NDN components. In this paper, we introduce Q-ICAN, a novel intelligent technique for detecting and mitigating cache pollution attacks in NDN. More specifically, Q-ICAN uses Q-Learning as an automated CPA prediction mechanism. Each NDN router integrates a reinforcement learning agent that utilizes impactful metrics such as the variation of the Cache Hit Ratio (CHR) and the interest inter-arrival time to learn how to differentiate between malicious and legitimate interests. We conducted several simulations using NDNSim to assess the effectiveness of our solution in terms of Cache Hit Ratio (CHR), Average Retrieval Delay (ARD) and multiple artificial intelligence evaluation metrics such as accuracy, precision, recall, etc. The obtained results confirm that Q-ICAN detects CPA attacks with a 95.09% accuracy rate, achieves a 94% CHR, and reduces ARD by 18%. Additionally, Q-ICAN adheres to the security policy of the NDN architecture and consumes fewer resources from NDN routers compared to existing state-of-the-art solutions.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] A Deep Q-Learning based approach applied to the Snake game
    Sebastianelli, Alessandro
    Tipaldi, Massimo
    Ullo, Silvia Liberata
    Glielmo, Luigi
    2021 29TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2021, : 348 - 353
  • [22] Metro Train Timetable Rescheduling Based on Q-learning Approach
    Su, Boyi
    Wang, Zhikai
    Su, Shuai
    Tang, Tao
    2020 IEEE 23RD INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2020,
  • [23] Q-Learning based point to point data transfer in Vanets
    Valantina, G. Mary
    Jayashri, S.
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1394 - 1400
  • [24] Content Delivery Networks - Q-Learning Approach for Optimization of the Network Cost and the Cache Hit Ratio
    de Almeida, Diego Felix
    Yen, Jason
    Aibin, Michal
    2020 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2020,
  • [25] Data-based optimal Denial-of-Service attack scheduling against robust control based on Q-learning
    An, Liwei
    Yang, Guang-Hong
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2019, 29 (15) : 5178 - 5194
  • [26] Multi-classifier and meta-heuristic based cache pollution attacks and interest flooding attacks detection and mitigation model for named data networking
    Buvanesvari, R.
    Joseph, Suresh K.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (06) : 839 - 864
  • [27] Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection
    Alavizadeh, Hooman
    Alavizadeh, Hootan
    Jang-Jaccard, Julian
    COMPUTERS, 2022, 11 (03)
  • [28] Reinforcement Learning-Based Multihop Relaying: A Decentralized Q-Learning Approach
    Wang, Xiaowei
    Wang, Xin
    ENTROPY, 2021, 23 (10)
  • [29] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Naveen Kumar
    Shashank Srivastava
    Arabian Journal for Science and Engineering, 2024, 49 : 3241 - 3251
  • [30] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Kumar, Naveen
    Srivastava, Shashank
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3241 - 3251