Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification
Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive...
Gespeichert in:
Veröffentlicht in: | IEEE network 2024-12, p.1-1 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE network |
container_volume | |
creator | Huang, Ying Hou, Rui Xing, Guanglin Dong, Mianxiong Ota, Kaoru Zeng, Deze |
description | Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks. |
doi_str_mv | 10.1109/MNET.2024.3519793 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_10810503</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10810503</ieee_id><sourcerecordid>10_1109_MNET_2024_3519793</sourcerecordid><originalsourceid>FETCH-LOGICAL-c633-7dc529caaaeacc1e98d808026e90f75506992ee5ddce1af3c842fa531244b7173</originalsourceid><addsrcrecordid>eNpNkLtOwzAUhi0EEqXwAEgMfoEUX-IkHksvUKmUgUiwRQfnGBnSGtnmNvHqJCoD0y_9t-Ej5JyzCedMX95uFvVEMJFPpOK61PKAjLhSVcZV8XhIRqzSLKtYnh-TkxhfGOO5kmJEfuaY0CTnd9RbOvNd9x7dB9LVLmHAmOiy8751u2c6TQnMa6R9cwNbbOkcEtANpk8fevsKYu_14YMPLV18pQD7W-sDrd0W6T0Gh5HOOojRWWdgiE_JkYUu4tmfjkm9XNSzm2x9d72aTdeZKaTMytYooQ0AIBjDUVdtxSomCtTMlkqxQmuBqNrWIAcrTZULC0pykedPJS_lmPD9rQk-xoC2eQtuC-G74awZADYDwGYA2PwB7DcX-41DxH_9ijPFpPwFDF9u6g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</title><source>IEEE Electronic Library (IEL)</source><creator>Huang, Ying ; Hou, Rui ; Xing, Guanglin ; Dong, Mianxiong ; Ota, Kaoru ; Zeng, Deze</creator><creatorcontrib>Huang, Ying ; Hou, Rui ; Xing, Guanglin ; Dong, Mianxiong ; Ota, Kaoru ; Zeng, Deze</creatorcontrib><description>Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks.</description><identifier>ISSN: 0890-8044</identifier><identifier>EISSN: 1558-156X</identifier><identifier>DOI: 10.1109/MNET.2024.3519793</identifier><identifier>CODEN: IENEET</identifier><language>eng</language><publisher>IEEE</publisher><subject>Accuracy ; Collusive interest flooding attack ; Feature extraction ; Monitoring ; Named data network ; Prevention and mitigation ; Quality of service ; Simulation ; TCPIP ; Telecommunication traffic ; Time factors ; Time series analysis ; Time series classification algorithm ; WEASEL</subject><ispartof>IEEE network, 2024-12, p.1-1</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0002-3382-1652 ; 0000-0001-7607-782X ; 0000-0002-2788-3451 ; 0000-0003-3276-1202</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10810503$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27906,27907,54740</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10810503$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Huang, Ying</creatorcontrib><creatorcontrib>Hou, Rui</creatorcontrib><creatorcontrib>Xing, Guanglin</creatorcontrib><creatorcontrib>Dong, Mianxiong</creatorcontrib><creatorcontrib>Ota, Kaoru</creatorcontrib><creatorcontrib>Zeng, Deze</creatorcontrib><title>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</title><title>IEEE network</title><addtitle>NET-M</addtitle><description>Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks.</description><subject>Accuracy</subject><subject>Collusive interest flooding attack</subject><subject>Feature extraction</subject><subject>Monitoring</subject><subject>Named data network</subject><subject>Prevention and mitigation</subject><subject>Quality of service</subject><subject>Simulation</subject><subject>TCPIP</subject><subject>Telecommunication traffic</subject><subject>Time factors</subject><subject>Time series analysis</subject><subject>Time series classification algorithm</subject><subject>WEASEL</subject><issn>0890-8044</issn><issn>1558-156X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkLtOwzAUhi0EEqXwAEgMfoEUX-IkHksvUKmUgUiwRQfnGBnSGtnmNvHqJCoD0y_9t-Ej5JyzCedMX95uFvVEMJFPpOK61PKAjLhSVcZV8XhIRqzSLKtYnh-TkxhfGOO5kmJEfuaY0CTnd9RbOvNd9x7dB9LVLmHAmOiy8751u2c6TQnMa6R9cwNbbOkcEtANpk8fevsKYu_14YMPLV18pQD7W-sDrd0W6T0Gh5HOOojRWWdgiE_JkYUu4tmfjkm9XNSzm2x9d72aTdeZKaTMytYooQ0AIBjDUVdtxSomCtTMlkqxQmuBqNrWIAcrTZULC0pykedPJS_lmPD9rQk-xoC2eQtuC-G74awZADYDwGYA2PwB7DcX-41DxH_9ijPFpPwFDF9u6g</recordid><startdate>20241219</startdate><enddate>20241219</enddate><creator>Huang, Ying</creator><creator>Hou, Rui</creator><creator>Xing, Guanglin</creator><creator>Dong, Mianxiong</creator><creator>Ota, Kaoru</creator><creator>Zeng, Deze</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3382-1652</orcidid><orcidid>https://orcid.org/0000-0001-7607-782X</orcidid><orcidid>https://orcid.org/0000-0002-2788-3451</orcidid><orcidid>https://orcid.org/0000-0003-3276-1202</orcidid></search><sort><creationdate>20241219</creationdate><title>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</title><author>Huang, Ying ; Hou, Rui ; Xing, Guanglin ; Dong, Mianxiong ; Ota, Kaoru ; Zeng, Deze</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c633-7dc529caaaeacc1e98d808026e90f75506992ee5ddce1af3c842fa531244b7173</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Collusive interest flooding attack</topic><topic>Feature extraction</topic><topic>Monitoring</topic><topic>Named data network</topic><topic>Prevention and mitigation</topic><topic>Quality of service</topic><topic>Simulation</topic><topic>TCPIP</topic><topic>Telecommunication traffic</topic><topic>Time factors</topic><topic>Time series analysis</topic><topic>Time series classification algorithm</topic><topic>WEASEL</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Ying</creatorcontrib><creatorcontrib>Hou, Rui</creatorcontrib><creatorcontrib>Xing, Guanglin</creatorcontrib><creatorcontrib>Dong, Mianxiong</creatorcontrib><creatorcontrib>Ota, Kaoru</creatorcontrib><creatorcontrib>Zeng, Deze</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE network</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huang, Ying</au><au>Hou, Rui</au><au>Xing, Guanglin</au><au>Dong, Mianxiong</au><au>Ota, Kaoru</au><au>Zeng, Deze</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</atitle><jtitle>IEEE network</jtitle><stitle>NET-M</stitle><date>2024-12-19</date><risdate>2024</risdate><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>0890-8044</issn><eissn>1558-156X</eissn><coden>IENEET</coden><abstract>Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks.</abstract><pub>IEEE</pub><doi>10.1109/MNET.2024.3519793</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-3382-1652</orcidid><orcidid>https://orcid.org/0000-0001-7607-782X</orcidid><orcidid>https://orcid.org/0000-0002-2788-3451</orcidid><orcidid>https://orcid.org/0000-0003-3276-1202</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0890-8044 |
ispartof | IEEE network, 2024-12, p.1-1 |
issn | 0890-8044 1558-156X |
language | eng |
recordid | cdi_ieee_primary_10810503 |
source | IEEE Electronic Library (IEL) |
subjects | Accuracy Collusive interest flooding attack Feature extraction Monitoring Named data network Prevention and mitigation Quality of service Simulation TCPIP Telecommunication traffic Time factors Time series analysis Time series classification algorithm WEASEL |
title | Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T09%3A07%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20Collusive%20Interest%20Flooding%20Attacks%20on%20Named%20Data%20Networks%20Based%20on%20Word%20Extraction%20for%20Time%20Series%20Classification&rft.jtitle=IEEE%20network&rft.au=Huang,%20Ying&rft.date=2024-12-19&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=0890-8044&rft.eissn=1558-156X&rft.coden=IENEET&rft_id=info:doi/10.1109/MNET.2024.3519793&rft_dat=%3Ccrossref_RIE%3E10_1109_MNET_2024_3519793%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10810503&rfr_iscdi=true |