Unlock instant, AI-driven research and patent intelligence for your innovation.
Content center network interest flooding attack detection method and system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A content-centric network, flooding attack technology, applied in the field of content-centric network interest flooding attack detection, can solve problems such as interest flooding attacks, and achieve the effect of solving interest flooding attacks
Inactive Publication Date: 2019-08-23
BEIJING INFORMATION SCI & TECH UNIV
View PDF8 Cites 8 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0010] The purpose of the present invention is to provide a method and system for detecting interest flooding attacks in content-centric networks, which can solve the problem of interest flooding attacks in content-centric networks
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 2
[0091] figure 2 It is a structural diagram of a detection system for interest flooding attacks in a content-centric network according to Embodiment 2 of the present invention. Such as figure 2 As shown, a detection system for interest flooding attacks in content-centric networks, including:
[0092] The traffic acquisition module 201 is configured to acquire traffic in the network.
[0094] The Hurst exponent calculation module 203 is configured to calculate the Hurst exponent of each time series.
[0095] The cumulative value determination module 204 of the Hurst exponent is used for accumulating the small variation of the Hurst exponent using a non-parametric accumulation and bilateral detection algorithm to obtain the cumulative value of the Hurst exponent.
[0096] An information entropy calculation module 205, configured to calculate the ...
Embodiment 3
[0102] S10, counting traffic in the network. Whenever an interest packet is received, information such as the content name of the interest packet, the number of requests, and the current time are collected.
[0103] Among them, the specific process of S10 is as follows:
[0104] S101, expanding the router PIT structure, adding a count field to record the number of times the Interest packet with the content name is requested in the current router;
[0105] S102. Whenever the network receives an Interest packet, record information such as the content name, count value, and current time of the current Interest packet.
[0106] For example, the data "10027999 nanoseconds since start of simulation: / root / good / %FE%03:14" indicates that at time 10027999ns, the interest packet with the content name " / root / good / %FE%03" was requested The number of times is 14.
[0107] S20, defining the size of the sliding window value, and dividing the collected network traffic into time series, so a...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a content center network interest flooding attack detection method and system. The method comprises the following steps: acquiring flow in a network; dividing the flow into time sequences to obtain a plurality of time sequences; calculating the Hurst index of each time sequence; carrying out small variation accumulation on the Hurst index by adopting a non-parameter accumulation and bilateral detection algorithm to obtain an accumulated value of the Hurst index; calculating the information entropy value of each time sequence; carrying out small variation accumulation onthe information entropy value by adopting a non-parameter accumulation and bilateral detection algorithm to obtain an accumulated value of the information entropy value; and judging whether an interest flooding attack exists in the current network or not according to the accumulated value of the Hurst index and the accumulated value of the information entropy value. By adopting the method or thesystem provided by the invention, the problem of interest flooding attack in the content center network can be solved.
Description
technical field [0001] The invention relates to the field of detection of interest flooding attacks on content-centric networks, in particular to a detection method and system for interest flooding attacks on content-centric networks. Background technique [0002] "Content Centric Network" (ContentCentricNetwork, CCN) is one of the most promising architectures of the future Internet. CCN names the content, and transmits information in the network through interest packets (Interest) and data packets (Data). Among them, the interest packet is a content request packet initiated by the user, carrying information such as content name; the data packet carries information requested by the user, and is used to satisfy the interest packet. [0003] Different from the traditional TCP / IP network, CCN replaces the IP address with the content name as the unique identifier of information transmission in the network, thus eliminating security problems such as source address forgery attack...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.