• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Zhijun, Zhang Rudan, Yue Meng. A Method for Joint Detection of Attacks in Named Data Networking[J]. Journal of Computer Research and Development, 2021, 58(3): 569-582. DOI: 10.7544/issn1000-1239.2021.20200448
Citation: Wu Zhijun, Zhang Rudan, Yue Meng. A Method for Joint Detection of Attacks in Named Data Networking[J]. Journal of Computer Research and Development, 2021, 58(3): 569-582. DOI: 10.7544/issn1000-1239.2021.20200448

A Method for Joint Detection of Attacks in Named Data Networking

Funds: This work was supported by the Joint Funds of the National Natural Science Foundation of China and Civil Aviation Administration of China (U1933108), the Scientific Research Project of Tianjin Municipal Education Commission (2019KJ117), and the Fundamental Research Funds for the Central Universities (3122020076, 3122019051).
More Information
  • Published Date: February 28, 2021
  • The interest flooding attack (IFA) and conspiracy interest flooding attack (CIFA) are typical security threats faced by the named data networking (NDN). Aiming at the problem that existing detection methods cannot effectively identify the attack types due to single detection features and the detection rate is not high enough, this paper proposes a method based on association rule algorithm and decision tree algorithm to detect attacks in NDN. First of all, by extracting the data information in the content cache (CS) of NDN routing node, the new detection feature “CS packet growth rate” in CS is mined. It is found in the experiment that “cache growth rate” is a favorable basis for distinguishing attack types. Secondly, association rule algorithm is used to combine the new detection feature with multiple detection features in pending interest table (PIT) to find the correlation between each feature. After preprocessing the output results of multiple association rules, they are used as input into the decision tree as a training set. Finally, the detection model generated by the decision tree algorithm is used to detect the attack. This method uses decision tree algorithm and association rule algorithm to jointly detect attacks in NDN, which not only avoids misjudgment caused by single detection features, but also enriches the classification attributes of decision trees. The simulation results show that this method can accurately distinguish and detect IFA and CIFA and improve the detection rate.
  • Related Articles

    [1]Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555
    [2]Liu Yang, Jin Peiquan. ZB+-tree: A Novel ZNS SSD-Aware Index Structure[J]. Journal of Computer Research and Development, 2023, 60(3): 509-524. DOI: 10.7544/issn1000-1239.202220502
    [3]Niu Xinzheng, Wang Chongyi, Ye Zhijia, She Kun. An Efficient Association Rule Hiding Algorithm Based on Cluster and Threshold Interval[J]. Journal of Computer Research and Development, 2017, 54(12): 2785-2796. DOI: 10.7544/issn1000-1239.2017.20160612
    [4]Yang Niya, Peng Tao, Liu Lu. Link Prediction Method Based on Clustering and Decision Tree[J]. Journal of Computer Research and Development, 2017, 54(8): 1795-1803. DOI: 10.7544/issn1000-1239.2017.20170172
    [5]Xu Hang, Wang Wenjian, Ren Lifang. A Method for Monotonic Classification Based on Decision Forest[J]. Journal of Computer Research and Development, 2017, 54(7): 1477-1487. DOI: 10.7544/issn1000-1239.2017.20160154
    [6]Fan Haixiong, Liu Fuxian, and Xia Lu. Research on Case Index BCS-Tree and Its Constructing Method[J]. Journal of Computer Research and Development, 2013, 50(12): 2629-2641.
    [7]Shen Yan, Song Shunlin, Zhu Yuquan. Mining Algorithm of Association Rules Based on Disk Table Resident FP-TREE[J]. Journal of Computer Research and Development, 2012, 49(6): 1313-1322.
    [8]Mao Yuxing and Shi Baile. An Incremental Method for Mining Generalized Association Rules Based on Extended Canonical-Order Tree[J]. Journal of Computer Research and Development, 2012, 49(3): 598-606.
    [9]Zhai Junhai, Wang Xizhao, Zhang Sufang. Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral[J]. Journal of Computer Research and Development, 2009, 46(3): 470-477.
    [10]Li Aijun, Luo Siwei, Huang Hua, Liu Yunhui. Decision Tree Based Neural Network Design[J]. Journal of Computer Research and Development, 2005, 42(8): 1312-1317.
  • Cited by

    Periodical cited type(2)

    1. 武永强,刘正刚. 基于决策树的工业通信网全链路数据异常检测方法. 电子设计工程. 2024(09): 138-141+146 .
    2. 樊娜,李思瑞,邹小敏,高艺丰. 面向VNDN的兴趣包洪泛攻击检测. 计算机系统应用. 2022(12): 41-50 .

    Other cited types(6)

Catalog

    Article views (617) PDF downloads (245) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return