Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting low interest flooding attacks in information centric network

A content-centric network, low-rate technology, applied in the field of network security, can solve the problems of low average rate of attack requests and high missed detection rate, and achieve the effect of improving accuracy and avoiding misjudgment problems.

Active Publication Date: 2018-06-29
INST OF INFORMATION ENG CAS
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this CUSUM method needs a fixed time or space window to calculate the statistical characteristics of the received requests. When the network is subjected to LIFA, the average rate of LIFA attack requests is very low, which may not be reflected in the overall statistical characteristics of the traffic. out, so there is also a high rate of missed detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting low interest flooding attacks in information centric network
  • Method and device for detecting low interest flooding attacks in information centric network
  • Method and device for detecting low interest flooding attacks in information centric network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are the Some, but not all, embodiments are invented. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] Because network traffic is easily affected by many factors such as network environment and time scale, it shows different characteristics, such as long-term correlation in large time scales, and the corresponding packet process is a generalized stationary process. In the NDN network, due to the impact of caching, PIT convergence, etc., the traffic will also show ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for detecting low interest flooding attacks (LIFA) in an information centric network, which can improve the accuracy of LIFA detection and reduce the occurrence of false alarms. The method comprises the steps of: S1, calculating a wavelet coefficient dj,k of each scale in a selected scale set by using a traffic sampling signal and a wavelet mother function in the information centric network, and reconstructing a low frequency portion of the traffic sampling signal by using the wavelet coefficient dj,k, wherein the number of wavelet decomposition layers is J, J is a positive integer, the scale set is a set of integers not less than and less than J, and dj,k represents detail information on the scale j and the translation k; and S2, comparing themodulus of the low frequency portion with a preset detection threshold, and if the modulus is not less than the detection threshold, determining a low interest flooding attack.

Description

technical field [0001] The invention relates to the field of network security, in particular to a detection method and device for a low-rate interest packet flooding attack in a content-centric network. Background technique [0002] The TCP / IP network architecture has demonstrated its practicability in the decades of development of the Internet, especially in the face of many upper and lower layers of new technologies and applications. However, with the development of the Internet, users' demand for services such as network mobility, content distribution, and security continues to increase, and problems in the existing network's support for mobility, content distribution, and security are gradually exposed. In order to cope with these new types of services, the academic community has proposed a new type of network architecture - Information Centric Network (ICN). As an instantiated model of ICN, Named Data Networking (NDN) is suitable for content distribution and is extreme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 辛永辉李杨杨兴华谭倩
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products