Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks

被引:27
|
作者
Yao, Lin [1 ,2 ]
Fan, Zhenzhen [1 ,3 ]
Deng, Jing [4 ]
Fan, Xin [1 ,2 ]
Wu, Guowei [1 ,3 ]
机构
[1] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116600, Peoples R China
[2] Dalian Univ Technol, DUT RU Int Sch Informat Sci & Engn, Dalian 116600, Peoples R China
[3] Dalian Univ Technol, Sch Software, Dalian 116600, Peoples R China
[4] Univ North Carolina Greensboro UNCG, Dept Comp Sci, Greensboro, NC 27412 USA
基金
中国国家自然科学基金;
关键词
Pollution; Fans; Clustering algorithms; Computer architecture; Partitioning algorithms; Classification algorithms; Resists; Cache pollution attack; clustering; named data networks;
D O I
10.1109/TDSC.2018.2876257
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Named Data Network (NDN), as a promising information-centric networking architecture, is expected to support next-generation of large-scale content distribution with open in-network cachings. However, such open in-network caches are vulnerable against Cache Pollution Attacks (CPAs) with the goal of filling cache storage with non-popular contents. The detection and defense against such attacks are especially difficult because of CPA's similarities with normal fluctuations of content requests. In this work, we use a clustering technique to detect and defend against CPAs. By clustering the content interests, our scheme is able to distinguish whether they have followed the Zipf-like distribution or not for accurate detections. Once any attack is detected, an attack table will be updated to record the abnormal requests. While such requests are still forwarded, the corresponding content chunks are not cached. Extensive simulations in ndnSIM demonstrate that our scheme can resist CPA effectively with higher cache hit, higher detecting ratio, lower hop count, and lower algorithm complexity compared to other state-of-the-art schemes.
引用
收藏
页码:1310 / 1321
页数:12
相关论文
共 50 条
  • [21] Neutralizing Interest Flooding Attacks in Named Data Networks using Cryptographic Route Tokens
    Alston, Aubrey
    Refaei, Tamer
    15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016), 2016, : 85 - 88
  • [22] Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
    Li, Yue
    Liu, Yingjian
    Wang, Yu
    Guo, Zhongwen
    Yin, Haoyu
    Teng, Hao
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1569 - 1578
  • [23] Detection of Collusive Interest Flooding Attacks in Named Data Networking Using Wavelet Analysis
    Xin, Yonghui
    Li, Yang
    Wang, Wei
    Li, Weiyuan
    Chen, Xin
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 557 - 562
  • [24] Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks
    Shieh, Chin-Shiuh
    Thanh-Tuan Nguyen
    Lin, Wan-Wei
    Lai, Wei Kuang
    Horng, Mong-Fong
    Miu, Denis
    ELECTRONICS, 2022, 11 (13)
  • [25] Cache sharing using bloom filters in named data networking
    Mun, Ju Hyoung
    Lim, Hyesook
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 90 : 74 - 82
  • [26] Cache Sharing Using a Bloom Filter in Named Data Networking
    Mun, Ju Hyoung
    Lim, Hyesook
    PROCEEDINGS OF THE 2016 SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS'16), 2016, : 127 - 128
  • [27] Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN)
    Hidouri, Abdelhak
    Hadded, Mohamed
    Touati, Haifa
    Hajlaoui, Nasreddine
    Muhlethaler, Paul
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2022, PT I, 2022, 13375 : 310 - 323
  • [28] Anomaly Detection using Data Clustering and Neural Networks
    Qiu, Hai
    Eklund, Neil
    Hu, Xiao
    Yan, Weizhong
    Iyer, Naresh
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 3627 - 3633
  • [29] A Detection and Defense Approach for Content Privacy in Named Data Network
    Dogruluk, Ertugrul
    Costa, Antonio
    Macedo, Joaquim
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [30] Cache Management for Large Data Transfers in Named Data Networking using SDN
    Alhowaidi, Mohammad
    Nadig, Deepak
    Ramamurthy, Byrav
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,