期刊文献+

CCN中基于节点状态模型的缓存污染攻击检测算法 被引量:7

Detection algorithm for cache pollution attacks based on node state model in content centric networking
下载PDF
导出
摘要 针对内容中心网络中的缓存污染攻击问题,以污染内容数量、分布状态和攻击强度3个参数对缓存污染攻击进行定量描述和分析,建立了攻击下的节点缓存状态模型。通过分析节点关键参数的变化,提出了基于节点状态模型的攻击检测原则,并分别以单位时间缓存替换率和请求达到率为观测参数进行算法实例化设计。仿真结果与性能分析表明,所提检测算法在应对分散式攻击与集中式攻击时,可以取得良好的检测性能。 Aiming at cache pollution attacks in content centric networking, the attacks were quantitatively described by three parameters, namely number of pollution contents, distribution of attack requests and attack intensity, then the cache state model of node under attack was built. Benefited from the analysis of key parameters of cache node, the attack detection principle based on node state model was put forward, correspondingly, two attack detection algorithms were instantiated with the observation parameters of cache replacement ratio and request arrival rate. The simulation results show that proposed algorithm can obtain good detection performance under each decentralized attack and centralized attack.
出处 《通信学报》 EI CSCD 北大核心 2016年第9期1-9,共9页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(No.2012CB315901) 国家自然科学基金创新群体(No.61521003) 国家高技术研究发展计划("863"计划)基金资助项目(No.2014AA01A701)~~
关键词 内容中心网络 缓存污染攻击 缓存状态模型 攻击检测 content centric networking cache pollution attacks cache state model attack detection
  • 相关文献

参考文献17

  • 1XYLOMENOS G, VERVERIDIS C, SIRIS V, et al. A survey of in- formation-centric networking research[J]. IEEE Communications Surveys & Tutorials, 2014, 16: 1024-1049.
  • 2JACOBSON V, SMETTERS D K, THORNTON J D, et al. Network- ing named content[J]. Communications of the ACM, 2012, 55(1): 117-124.
  • 3兰巨龙,程东年,胡宇翔.可重构信息通信基础网络体系研究[J].通信学报,2014,35(1):128-139. 被引量:61
  • 4ACS G, CONTI M, GASTI P, et al. Cache privacy in named-data networking[C]//IEEE International Conference on Distributed Com- puting Systems. Philadelphia, USA, 2013: 41-51.
  • 5CHAABANE A, DE CRISTOFARO E, KAAFAR M A, et al. Privacy in content-oriented networking: threats and countermeasures[J]. ACM SIGCOMM Computer Communication Review, 2013, 43(3): 25-33.
  • 6LAUINGER T. Security & scalability of eontent-centric network- ing[D]. TU Darmstadt, 2010.
  • 7CONTI M, GASTI P, TEOLI M. A lightweight mechanism for detec- tion of cache pollution attacks in named data networking[J]. Computer Networks, 2013, 57(16): 3178-3191.
  • 8PARK H, WIDJAJA I, LEE H. Detection of cache pollution attacks using randomness checks[C]//IEEE International Conference on Com- munications (ICC). Ottawa, 2012:1096-1100.
  • 9XIE M, WIDJAJA I, WANG H. Enhancin cache robustness for eon- tent-c.entrie networking[C]//IEEE INFOCOM Annual IEEE International Conference on Computer Communications. Orlando, 2012: 2426-2434.
  • 10SANDBERG A, EKLOv D, HAGERSTEN E. Reducing cache pollu- tion through detection and elimination of non-temporal memory ac- cesses[C]//2010 ACM/IEEE International Conference for High Per- formanee Computing, Networking, Storage and Analysis. Washington DC: IEEE Computer Society, 2010: 1-11.

二级参考文献8

共引文献60

同被引文献43

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部