Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks

被引:27
|
作者
Yao, Lin [1 ,2 ]
Fan, Zhenzhen [1 ,3 ]
Deng, Jing [4 ]
Fan, Xin [1 ,2 ]
Wu, Guowei [1 ,3 ]
机构
[1] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116600, Peoples R China
[2] Dalian Univ Technol, DUT RU Int Sch Informat Sci & Engn, Dalian 116600, Peoples R China
[3] Dalian Univ Technol, Sch Software, Dalian 116600, Peoples R China
[4] Univ North Carolina Greensboro UNCG, Dept Comp Sci, Greensboro, NC 27412 USA
基金
中国国家自然科学基金;
关键词
Pollution; Fans; Clustering algorithms; Computer architecture; Partitioning algorithms; Classification algorithms; Resists; Cache pollution attack; clustering; named data networks;
D O I
10.1109/TDSC.2018.2876257
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Named Data Network (NDN), as a promising information-centric networking architecture, is expected to support next-generation of large-scale content distribution with open in-network cachings. However, such open in-network caches are vulnerable against Cache Pollution Attacks (CPAs) with the goal of filling cache storage with non-popular contents. The detection and defense against such attacks are especially difficult because of CPA's similarities with normal fluctuations of content requests. In this work, we use a clustering technique to detect and defend against CPAs. By clustering the content interests, our scheme is able to distinguish whether they have followed the Zipf-like distribution or not for accurate detections. Once any attack is detected, an attack table will be updated to record the abnormal requests. While such requests are still forwarded, the corresponding content chunks are not cached. Extensive simulations in ndnSIM demonstrate that our scheme can resist CPA effectively with higher cache hit, higher detecting ratio, lower hop count, and lower algorithm complexity compared to other state-of-the-art schemes.
引用
收藏
页码:1310 / 1321
页数:12
相关论文
共 50 条
  • [1] Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks
    Wang, Hanbo
    Man, Dapeng
    Han, Shuai
    Wang, Huanran
    Yang, Wu
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 545 - 556
  • [2] A lightweight mechanism for detection of cache pollution attacks in Named Data Networking
    Conti, Mauro
    Gasti, Paolo
    Teoli, Marco
    COMPUTER NETWORKS, 2013, 57 (16) : 3178 - 3191
  • [3] Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
    Yao, Lin
    Zeng, Yujie
    Wang, Xin
    Chen, Ailun
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2848 - 2860
  • [4] An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
    Karami, Amin
    Guerrero-Zapata, Mane
    COMPUTER NETWORKS, 2015, 80 : 51 - 65
  • [5] Detection of Cache Pollution Attacks Using Randomness Checks
    Park, Hyundo
    Widjaja, Indra
    Lee, Heejo
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [6] A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture
    Hidouri, Abdelhak
    Touati, Haifa
    Hadded, Mohamed
    Hajlaoui, Nasreddine
    Muhlethaler, Paul
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 : 435 - 446
  • [7] Assuaging cache based attacks in Named Data Network
    Adithya, S.
    Karthik, Gowtham G.
    Hariharan, H.
    Vetriselvi, V.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 872 - 876
  • [8] Multi-classifier and meta-heuristic based cache pollution attacks and interest flooding attacks detection and mitigation model for named data networking
    Buvanesvari, R.
    Joseph, Suresh K.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (06) : 839 - 864
  • [9] Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks
    Xu, Qichao
    Su, Zhou
    Zhang, Kuan
    Li, Peng
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (03): : 241 - 252
  • [10] Mitigating Cache Pollution Attack Using Deep Learning in Named Data Networking (NDN)
    Hamdi, Mohd Maizan Fishol
    Chen, Zhiyuan
    Radenkovic, Milena
    INTELLIGENT COMPUTING, VOL 2, 2024, 2024, 1017 : 432 - 442