Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-parameter cache pollution attack detection method in content centric networking

A content-centric network, pollution attack technology, applied in electrical components, transmission systems, etc., can solve problems such as low computational overhead, accurate detection of cache pollution attack behavior, and small decision threshold, to achieve the effect of improving overall security performance

Active Publication Date: 2018-04-10
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its advantage is that the calculation cost is small, and it can detect cache pollution attacks very well, especially distributed attacks; its disadvantage is that when there is no cache pollution attack, the judgment threshold is small, and the change in the request probability of normal users may be greater than the judgment threshold. , leading to misjudgment
The literature "Karami A, Guerrero-Zapata M.An anfis-based cache replacement method formitigating cache pollution attacks in named data networking [J]. ComputerNetworks, 2015, 80:51-65." proposes an adaptive fuzzy neural network cache Replacement strategy, the output of the neural network is used as the detection basis for cache pollution attacks, and the amount of calculation is large
[0005] Summarizing the existing typical cache pollution attack detection mechanisms, it is not difficult to find that they only observe a single network parameter when designing cache pollution attack detection algorithms, so it is often difficult to detect cache pollution attack behaviors in a timely and accurate manner, and few simultaneous The case of joint attack detection considering multiple network parameters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-parameter cache pollution attack detection method in content centric networking
  • Multi-parameter cache pollution attack detection method in content centric networking
  • Multi-parameter cache pollution attack detection method in content centric networking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are only part of the embodiments of the present invention, and Not all examples.

[0023] The invention provides a multi-parameter cache pollution attack detection method in a content-centric network, such as figure 1 ,include:

[0024] The attack detection is carried out in a cycle T cycle, and the time length Δt is extracted in the cycle T, and the sampling value AID(T) of the attack influence degree AID in the current cycle is calculated;

[0025] Calculate the variation of the sampling value of the attack influence degree AID in the current period relative to the sampling value of the attack influence degree AID in the previous period, which is defined as the variation of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to content centric networking, in particular to a multi-parameter cache pollution attack detection method in the content centric networking. The multi-parameter cache pollution attack detection method in the content centric networking comprises the following steps: performing attack detection periodically and circularly, and calculating a sampling value of the attack impact degree in the current cycle; defining the variable quantity of the sampling value of the current attack impact degree to the last cycle as the variable quantity of the attack impact degree; setting a threshold according to the standard deviation of the variable quantity of the attack impact degree in a number of cycles; and determining that the attack occurs if the variable quantity of the attack impact degree exceeds the threshold. Compared with the traditional cache pollution attack detection method, the multi-parameter cache pollution attack detection method in the content centric networkingcan cope with more complex network environment, and can detect the cache pollution attack behavior in time and accurately, therefore, the multi-parameter cache pollution attack detection method in the content centric networking helps to improve the overall security performance of the content centric networking.

Description

technical field [0001] The invention relates to a content-centric network, in particular to a multi-parameter cache pollution attack detection method in a content-centric network. Background technique [0002] With the continuous development of Internet technology and applications, users' demand for network data content is increasing day by day, and content requests and information services have gradually become the main body of network applications. The traditional host-centric IP network architecture is increasingly difficult to meet the current Internet requirements. development requirements. In order to meet the requirements of future network development, the University of California, Los Angeles and the Palo Alto Research Center (Palo Alto Research Center, PARC) proposed a content-centric network (Content Centric Networking, CCN) that replaces IP addresses with content, and quickly It has become a research hotspot in the current future network architecture. [0003] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L67/568H04L67/63
Inventor 刘期烈李建雄诸葛丽强蒋文豪李云曹傧刘竟成李国军
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products