Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
Title | Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks |
Publication Type | Journal Article |
Year of Publication | 2019 |
Authors | HOU, RUI, Han, Min, Chen, Jing, Hu, Wenbin, Tan, Xiaobin, Luo, Jiangtao, Ma, Maode |
Journal | IEEE Network |
Volume | 33 |
Pagination | 116—121 |
ISSN | 1558-156X |
Keywords | Bandwidth, channel capacity, Computer architecture, computer network security, detection accuracy, DoS attacks, Entropy, Flooding Attacks, Fluctuations, Human Behavior, IFA attackers, IFA countermeasures, information-centric networking, Internet, Internet architecture, IP networks, IP-based networks, malicious interest packets, named data network, Named Data Network Security, Network security, pubcrawl, rapidly volatile attacks, resilience, Resiliency, safety hazard, Scalability |
Abstract | NDN has been widely regarded as a promising representation and implementation of information- centric networking (ICN) and serves as a potential candidate for the future Internet architecture. However, the security of NDN is threatened by a significant safety hazard known as an IFA, which is an evolution of DoS and distributed DoS attacks on IP-based networks. The IFA attackers can create numerous malicious interest packets into a named data network to quickly exhaust the bandwidth of communication channels and cache capacity of NDN routers, thereby seriously affecting the routers' ability to receive and forward packets for normal users. Accurate detection of the IFAs is the most critical issue in the design of a countermeasure. To the best of our knowledge, the existing IFA countermeasures still have limitations in terms of detection accuracy, especially for rapidly volatile attacks. This article proposes a TC to detect the distributions of normal and malicious interest packets in the NDN routers to further identify the IFA. The trace back method is used to prevent further attempts. The simulation results show the efficiency of the TC for mitigating the IFAs and its advantages over other typical IFA countermeasures. |
URL | https://ieeexplore.ieee.org/document/8694786 |
DOI | 10.1109/MNET.2019.1800350 |
Citation Key | hou_theil-based_2019 |
- internet
- Scalability
- safety hazard
- Resiliency
- resilience
- rapidly volatile attacks
- pubcrawl
- network security
- Named Data Network Security
- named data network
- malicious interest packets
- IP-based networks
- IP networks
- Internet architecture
- Bandwidth
- information-centric networking
- IFA countermeasures
- IFA attackers
- Human behavior
- Fluctuations
- Flooding Attacks
- Entropy
- DoS attacks
- detection accuracy
- computer network security
- computer architecture
- channel capacity