Expression of Concern for: Interest Flooding Attack Detection Method in NDN Networks

To viably identify interest flooding assault (IFA) in Named Data Networking (NDN), this paper proposes a discovery technique for interest flooding assault dependent on chi-square test and similitude test. Initially, it decides the identification window size dependent on the dissemination of data nam...

Full description

Saved in:
Bibliographic Details
Published in:2021 2nd International Conference on Smart Electronics and Communication (ICOSEC) p. 1
Main Authors: Mounika, V., Raghavendra Sai, N., Bhavani, Vasantha, Sridhar, P S V S
Format: Conference Proceeding
Language:English
Published: IEEE 07-10-2021
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To viably identify interest flooding assault (IFA) in Named Data Networking (NDN), this paper proposes a discovery technique for interest flooding assault dependent on chi-square test and similitude test. Initially, it decides the identification window size dependent on the dissemination of data name prefixes (that is data entropy) in the current organization traffic. The assailants might annex subjective irregular suffix to a certain prefix in the organization traffic, and afterward send an enormous number of interest parcels that can't get the reaction. Focused on at this issue, the affectability of chi-square test is utilized to distinguish the difference in pre-fix of interest parcels. Premium parcels started by IFA assailants are generally joined to a genuine prefix, yet with an arbitrarily created suffix appended. Considering of this issue, the similitude of interest parcel prefixes is additionally identified. At long last, the location consequences of the two viewpoints are consolidated to hinder mine if interest flooding assault has happened. Moreover, as indicated by the symmetric steering normal for Pending Interest Table (PIT), likewise the fashioned interest parcel will be sent back to the aggressor, and afterward confine the corresponding port of the assailant, to viably smother the IFA assault. The test results show that the proposed technique cannot just identify IFA in NDN toward the start of the assault, yet in addition is more precise and powerful than different strategies.
DOI:10.1109/ICOSEC51865.2021.10702908