Accuracy or delay? A game in detecting interest flooding attacks

19Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Due to the continuous recording of forwarding states, Information-centric networking (ICN) introduces a new security threat named interest flooding attack. To mitigate this attack, most of the existing works focus on the detecting accuracy. However, we find another important factor that the detecting delay may result in long-term memory occupation. In this letter, aiming to balance the detecting accuracy and delay, we propose an m-list table-based attack detecting (mTBAD) solution to minimize the detecting delay while guaranteeing the accuracy. Particularly, mTBAD maintains an m-list table for malicious Interests entries by combining the disabling PIT exhaustion (DPE) and the negative acknowledgments (NACK). A lightweight monitor is equipped to issue m-NACK packets to inform the attacked router and update its m-list. Extensive simulations based on the GÉANT topology demonstrate that mTBAD reduces the detecting delay by 99.5% (from 280 to 1.2 milliseconds) compared with a state-of-the-art mechanism, at the expense of a very slight loss regarding the false negative rate and the false positive rate. It proves that mTBAD can guarantee the detecting accuracy as well as to prevent long-term memory occupation.

Cite

CITATION STYLE

APA

Liu, G., Quan, W., Cheng, N., Wang, K., & Zhang, H. (2018, March 1). Accuracy or delay? A game in detecting interest flooding attacks. Internet Technology Letters. John Wiley and Sons Inc. https://doi.org/10.1002/itl2.31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free