...
首页> 外文期刊>IEEE transactions on information forensics and security >Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking
【24h】

Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking

机译:在命名数据网络的实际部署中可靠地检测兴趣泛洪攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Named data networking (NDN) is a disruptive yet promising architecture for the future Internet, in which the content diffusion mechanisms are shifted from the conventional host-centric to content-centric ones so that the data delivery can be significantly improved. After a decade of research and development, NDN and the related NDN forwarding daemon implementations are now mature enough to enable stakeholders, such as telcos, to consider them for a real deployment. Consequently, NDN and IP will likely cohabit, and the future Internet may be formed of isolated administrative domains, each deploying one of these two network paradigms. The security question of the resulting architecture naturally arises. In this paper, we consider the case of denial of service. Even though the interest flooding attack (IFA) has been largely studied and mitigated through NACK packets in pure NUN networks, we demonstrate in this paper through experimental assessments that there are still some ways to mount such an attack, and especially in the context of coupling NDN with IP, which can hardly he addressed by current solutions. Subsequently, we leverage the hypothesis testing theory to develop a generalized likelihood ratio test adapted to evolve IFA attacks. Simulations show the relevance of the proposed model for guaranteeing the prescribed probability of false alarm and highlight the trade-off between detection power and delay. Finally, we consider a real deployment scenario where NDN is coupled with IP to carry HTTP traffic. We show that the model of IFA attacks is not very accurate in practice and further develops a sequential detector to keep a high detection accuracy. By considering data from the testbed, we show the efficiency of the overall detection method.
机译:命名数据网络(NDN)是未来Internet的一种破坏性但很有希望的体系结构,其中内容扩散机制已从传统的以主机为中心转变为以内容为中心,从而可以显着改善数据传递。经过十多年的研究和开发,NDN和相关的NDN转发守护程序实现现在已经足够成熟,可以使利益相关者(例如电信公司)考虑将其真正部署。因此,NDN和IP可能会共存,并且未来的Internet可能由孤立的管理域组成,每个管理域都部署这两种网络范例之一。由此产生的体系结构的安全性问题自然而然地出现了。在本文中,我们考虑拒绝服务的情况。即使已经通过纯NUN网络中的NACK数据包大量研究并缓解了兴趣泛滥攻击(IFA),我们还是通过实验评估证明了本文中仍有一些方法可以发起此类攻击,尤其是在耦合的情况下具有IP的NDN,当前的解决方案几乎无法解决。随后,我们利用假设检验理论来开发适用于发展IFA攻击的广义似然比检验。仿真显示了所提出的模型对于保证规定的虚警概率的相关性,并突出了检测功率与延迟之间的权衡。最后,我们考虑一个实际的部署场景,其中NDN与IP耦合以承载HTTP流量。我们表明,IFA攻击模型在实践中不是很准确,并且进一步开发了顺序检测器以保持较高的检测精度。通过考虑来自测试床的数据,我们展示了整体检测方法的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号