Method and system for detecting interest packet flooding attack in content center network

A content-centric network, flooding attack technology, applied in the field of interest packet flooding attack detection in content-centric networks, can solve the problems of high algorithm complexity, inappropriate attacker attack forms, etc., to reduce false positives

Active Publication Date: 2018-07-31
CHONGQING UNIV OF POSTS & TELECOMM
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the complexity of the algorithm is high, and it is not suitab

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting interest packet flooding attack in content center network
  • Method and system for detecting interest packet flooding attack in content center network
  • Method and system for detecting interest packet flooding attack in content center network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to enable those skilled in the art to better understand the purpose, technical solutions and beneficial effects of the present invention, a complete description will be given below in conjunction with specific embodiments and accompanying drawings.

[0047] The invention provides an attack schematic diagram of an interest packet flood attack in a content-centric network. Such as figure 1 As shown, in the content-centric network, when the attacker sends a large number of false interest packets to the network, the router in the network is full of the space of its pending interest table PIT. At this time, the router will directly send the normal interest requested by the legitimate user The packet is discarded so that the legitimate user does not get a response with the corresponding packet.

[0048] A flowchart of a method for detecting interest packet flooding attacks in a content-centric network provided by the present invention. Such as figure 2 As shown, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, and relates to a method and system for detecting an interest packet flooding attack in a content center network. The method comprisesthe following steps: counting a probability distribution model of a content name prefix of an interest packet; calculating an information entropy of a router according to a statistical value; and comparing the information entropy with a given threshold, and then calculating an entropy rate. In the interest packet flooding attack detection scheme designed by the invention, the difference between the entropy rate change of the legal burst stream and the attack stream is considered, the outburst stream of a legitimate user and an attack stream of an attacker are effectively distinguished on the premise of ensuring that the attack is detected as soon as possible, thereby effectively reducing the misjudgment of the legitimate user.

Description

technical field [0001] The invention relates to network attack detection in content-centric networks, in particular to a method and system for detecting interest packet flooding attacks in content-centric networks. Background technique [0002] With the development of the Internet, the content that needs to be delivered in the network is increasing, so people gradually shift their focus from "where" to "what". Based on this, Professor Van Jacobson of the PARC Research Center in the United States and others proposed in 2009 A new next-generation network architecture. Among them, the content center network (Content center network, CCN) is a network belonging to the new next-generation network architecture. CCN is a content-based network, and its core idea is to name each content in the network instead of Use the IP address of the host and node. When a user needs to obtain a content / service, the network node will send a request containing the desired content / service name, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/721
Inventor 韦世红朱红梅李兆玉陈翔李朋明王纪超
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products