期刊文献+

一种联合检测命名数据网络中攻击的方法 被引量:2

A Method for Joint Detection of Attacks in Named Data Networking
下载PDF
导出
摘要 兴趣泛洪攻击(interest flooding attack,IFA)和合谋兴趣泛洪攻击(conspiracy interest flooding attack,CIFA)是命名数据网络(named data networking,NDN)面临的典型的安全威胁.针对现有检测方法的检测特征单一因此不能有效地辨别攻击种类以及检测率不够高等问题,提出一种基于关联规则算法和决策树算法联合检测NDN中攻击的方法.首先,通过提取NDN路由节点的内容缓存(content cache,CS)中的数据信息挖掘CS中新的检测特征“缓存增长率”,实验发现“CS数据包增长率”是辨别IFA还是CIFA的有利依据.其次,使用关联规则算法将新的检测特征与待定兴趣表(pending interest table,PIT)中多个检测特征联合,寻找各个特征之间的关联性并将其作为决策树的输入.最后,使用决策树算法检测攻击.该方法使用决策树算法和关联规则算法联合检测NDN中的攻击,不仅避免了单一特征检测攻击造成的误判并且丰富了决策树的分类属性.分析仿真结果表明该检测方法可以精确地区分并检测IFA和CIFA并且提高了检测率. The interest flooding attack(IFA)and conspiracy interest flooding attack(CIFA)are typical security threats faced by the named data networking(NDN).Aiming at the problem that existing detection methods cannot effectively identify the attack types due to single detection features and the detection rate is not high enough,this paper proposes a method based on association rule algorithm and decision tree algorithm to detect attacks in NDN.First of all,by extracting the data information in the content cache(CS)of NDN routing node,the new detection feature“CS packet growth rate”in CS is mined.It is found in the experiment that“cache growth rate”is a favorable basis for distinguishing attack types.Secondly,association rule algorithm is used to combine the new detection feature with multiple detection features in pending interest table(PIT)to find the correlation between each feature.After preprocessing the output results of multiple association rules,they are used as input into the decision tree as a training set.Finally,the detection model generated by the decision tree algorithm is used to detect the attack.This method uses decision tree algorithm and association rule algorithm to jointly detect attacks in NDN,which not only avoids misjudgment caused by single detection features,but also enriches the classification attributes of decision trees.The simulation results show that this method can accurately distinguish and detect IFA and CIFA and improve the detection rate.
作者 吴志军 张入丹 岳猛 Wu Zhijun;Zhang Rudan;Yue Meng(College of Electronic Information and Automation,Civil Aviation University of China,Tianjin 300300)
出处 《计算机研究与发展》 EI CSCD 北大核心 2021年第3期569-582,共14页 Journal of Computer Research and Development
基金 国家自然基金委员会与中国民航局联合基金项目(U1933108) 天津市教委科研计划项目(2019KJ117) 中央高校基本科研业务费专项资金(3122020076,3122019051)。
关键词 命名数据网络 兴趣泛洪攻击 合谋兴趣泛洪攻击 关联规则 决策树 named data networking(NDN) interest flooding attack(IFA) conspiracy interest flooding attack(CIFA) association rules decision tree
  • 相关文献

参考文献8

二级参考文献65

  • 1高海华,杨辉华,王行愚.基于PCA和KPCA特征抽取的SVM网络入侵检测方法[J].华东理工大学学报(自然科学版),2006,32(3):321-326. 被引量:20
  • 2赵峰,张军英.一种KPCA的快速算法[J].控制与决策,2007,22(9):1044-1048. 被引量:14
  • 3BARALIS,GARZA P.A lazy approach to pruning classificationrules. Proceedings of IEEE 2002 International Conference onData Mining . 2002
  • 4YIN X,HAN J.CPAR:Classification based on predictive associa-tion rules. http://www.siam.org/proceedings/datamining/2003/dm03_40YinX.pdf . 2010
  • 5WANG J,KARYPIS G.HARMONY:Efficiently mining the bestrules for classification. http://www.siam.org/proceedings/datamining/2005/dm05_19wangj.pdf . 2010
  • 6ZHUX Y,SONG Q B,JIA Z H.A weighted voting-based associa-tive classification algorithm. Computer Journal . 2010
  • 7CERF L,GAY D,SELMAOUI N,et al.A parameter-free associa-tive classification method. Proceedings of the 10th Internation-al Conference on Data Warehousing and Knowledge Discovery . 2008
  • 8CONG GAO,TANKL,TUNG AKH,et al.Mining top-k coveringrule groups for gene expression data. Proceedings of 2005ACM SIGMOD International Conference on Management of Data . 2005
  • 9W. Pedrycz.Fuzzy set technology in knowledge discovery. Fuzzy Sets and Systems . 1998
  • 10FA Thabtah,PI Cowling.A greedy classification algorithm based on association rule. Appl Soft Comput . 2007

共引文献77

同被引文献22

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部