首页> 外文期刊>IEEE transactions on information forensics and security >Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking
【24h】

Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking

机译:可靠地检测利息洪水攻击,实际部署名为数据网络

获取原文
获取原文并翻译 | 示例
           

摘要

Named data networking (NDN) is a disruptive yet promising architecture for the future Internet, in which the content diffusion mechanisms are shifted from the conventional host-centric to content-centric ones so that the data delivery can be significantly improved. After a decade of research and development, NDN and the related NDN forwarding daemon implementations are now mature enough to enable stakeholders, such as telcos, to consider them for a real deployment. Consequently, NDN and IP will likely cohabit, and the future Internet may be formed of isolated administrative domains, each deploying one of these two network paradigms. The security question of the resulting architecture naturally arises. In this paper, we consider the case of denial of service. Even though the interest flooding attack (IFA) has been largely studied and mitigated through NACK packets in pure NUN networks, we demonstrate in this paper through experimental assessments that there are still some ways to mount such an attack, and especially in the context of coupling NDN with IP, which can hardly he addressed by current solutions. Subsequently, we leverage the hypothesis testing theory to develop a generalized likelihood ratio test adapted to evolve IFA attacks. Simulations show the relevance of the proposed model for guaranteeing the prescribed probability of false alarm and highlight the trade-off between detection power and delay. Finally, we consider a real deployment scenario where NDN is coupled with IP to carry HTTP traffic. We show that the model of IFA attacks is not very accurate in practice and further develops a sequential detector to keep a high detection accuracy. By considering data from the testbed, we show the efficiency of the overall detection method.
机译:命名的数据网络(NDN)是未来互联网的中断但是有前途的架构,其中内容扩散机制从传统的主机中心转向以内容为中心,以便可以显着提高数据传送。经过十年的研发,NDN和相关的NDN转发守护程序实现现在已经成熟,以使利益相关者(如Telco)才能考虑实际部署。因此,NDN和IP可能会同居,未来的互联网可以由隔离的管理域形成,每个互联网都可以部署这两个网络范例之一。产生的架构的安全问题自然地出现了。在本文中,我们考虑了拒绝服务的情况。尽管利息泛滥攻击(IFA)通过纯Nun网络中的​​NACK数据包进行了很大程度上和减轻了,但我们通过实验评估在本文中展示了仍有一些方法来安装这种攻击,特别是在耦合的背景下NDN具有IP,几乎不能通过当前解决方案解决。随后,我们利用假设检测理论来发展适于演化IFA攻击的广义似然比测试。模拟显示了提出的模型保证规定误报概率,并突出显示检测功率与延迟之间的权衡。最后,我们考虑一个真正的部署方案,其中NDN与IP耦合以携带HTTP流量。我们表明IFA攻击模型在实践中并不是非常准确,并进一步开发一个顺序检测器以保持高检测精度。通过考虑从测试平台的数据,我们展示了整体检测方法的效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号