Detection algorithm for cache pollution attacks based on node state model in content centric networking
Papers|更新时间:2024-06-05
|
Detection algorithm for cache pollution attacks based on node state model in content centric networking
Journal on CommunicationsVol. 37, Issue 9, Pages: 1-9(2016)
作者机构:
国家数字交换系统工程技术研究中心,河南 郑州 450002
作者简介:
基金信息:
The National Basic Research Program of China (973 Program)(2012CB315901);The Innovation Group Program Project of National Natural Science Foundation of China(61521003);The National High Technology R&D Program of China(863 Pro-gram)(2014AA01A701)
Hong-bo TANG, Lin-hao ZHENG, Guo-dong GE, et al. Detection algorithm for cache pollution attacks based on node state model in content centric networking[J]. Journal on Communications, 2016, 37(9): 1-9.
DOI:
Hong-bo TANG, Lin-hao ZHENG, Guo-dong GE, et al. Detection algorithm for cache pollution attacks based on node state model in content centric networking[J]. Journal on Communications, 2016, 37(9): 1-9. DOI: 10.11959/j.issn.1000-436x.2016172.
Detection algorithm for cache pollution attacks based on node state model in content centric networking
Aiming at cache pollution attacks in content centric networking
the attacks were quantitatively described by three parameters
namely number of pollution contents
distribution of attack requests and attack intensity
then the cache state model of node under attack was built.Benefited from the analysis of key parameters of cache node
the attack detection principle based on node state model was put forward
correspondingly
two attack detection algorithms were instantiated with the observation parameters of cache replacement ratio and request arrival rate.The simulation results show that proposed algorithm can obtain good detection performance under each decentralized attack and centralized attack.
关键词
Keywords
references
XYLOMENOS G , VERVERIDIS C , SIRIS V , et al . A survey of information-centric networking research [J ] . IEEE Communications Surveys & Tutorials , 2014 , 16 : 1024 - 1049 .
JACOBSON V , SMETTERS D K , THORNTON J D , et al . Networking named content [J ] . Communications of the ACM , 2012 , 55 ( 1 ): 117 - 124 .
LAN J L , CHENG D N , HU Y X . Research on reconfigurable information communication based network architecture [J ] . Journal on Communications , 2014 , 35 ( 1 ): 128 - 139 .
ACS G , CONTI M , GASTI P , et al . Cache privacy in named-data networking [C ] // IEEE International Conference on Distributed Computing Systems . Philadelphia,USA , 2013 : 41 - 51 .
CHAABANE A , DE CRISTOFARO E , KAAFAR M A , et al . Privacy in content-oriented networking:threats and countermeasures [J ] . ACM SIGCOMM Computer Communication Review , 2013 , 43 ( 3 ): 25 - 33 .
LAUINGER T . Security & scalability of content-centric networking [D ] . TU Darmstadt , 2010 .
CONTI M , GASTI P , TEOLI M . A lightweight mechanism for detection of cache pollution attacks in named data networking [J ] . Computer Networks , 2013 , 57 ( 16 ): 3178 - 3191 .
PARK H , WIDJAJA I , LEE H . Detection of cache pollution attacks using randomness checks [C ] // IEEE International Conference on Communications (ICC) . Ottawa , 2012 : 1096 - 1100 .
XIE M , WIDJAJA I , WANG H . Enhancing cache robustness for content-centric networking [C ] // IEEE INFOCOM Annual IEEE International Conference on Computer Communications . Orlando , 2012 : 2426 - 2434 .
SANDBERG A,EKLÖV D , HAGERSTEN E . Reducing cache pollution through detection and elimination of non-temporal memory accesses [C ] // 2010 ACM/IEEE International Conference for High Performance Computing,Networking,Storage and Analysis . Washington DC:IEEE Computer Society , 2010 : 1 - 11 .
KIM Y , YEOM I . Performance analysis of in-network caching for content-centric networking [J ] . Computer Networks , 2013 , 57 ( 13 ): 2465 - 2482 .
DAN A , TOWSLEY D . An approximate analysis of the LRU and FIFO buffer replacement schemes [M ] . New York,USA : ACM PublisherPress , 1990 : 143 - 152 .
CHAI W K , HE D , PSARAS I , et al . Cache “less for more” in information-centric networks [C ] // IFIP Networking . Prague,Czech , 2012 : 27 - 40 .
ROSENSWEIG E J , KUROSE J , TOWSLEY D . Approximate models for general cache networks [C ] // IEEE INFOCOM 2010 . San Diego , 2010 : 1 - 9 .
DENG L , GAO Y , CHEN Y , et al . Pollution attacks and defenses for Internet caching systems [J ] . Computer Networks , 2008 , 52 ( 5 ): 935 - 956 .
MOHAISEN A , ZHANG X W , SCHUCHARD M , et al . Protecting access privacy of cached contents in information centric networks [C ] // ACM SIGSAC Symposium on Information,Computer and Communications Security . Hangzhou,China , 2013 : 173 - 178 .
AFANASYEV A , MAHADEVAN P , MOISEENKO I , et al . Interest flooding attack and countermeasures in named data networking [C ] // IFIP Networking Conference . New York , 2013 : 1 - 9 .