Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification

Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE network 2024-12, p.1-1
Hauptverfasser: Huang, Ying, Hou, Rui, Xing, Guanglin, Dong, Mianxiong, Ota, Kaoru, Zeng, Deze
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE network
container_volume
creator Huang, Ying
Hou, Rui
Xing, Guanglin
Dong, Mianxiong
Ota, Kaoru
Zeng, Deze
description Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks.
doi_str_mv 10.1109/MNET.2024.3519793
format Article
fullrecord <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_10810503</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10810503</ieee_id><sourcerecordid>10_1109_MNET_2024_3519793</sourcerecordid><originalsourceid>FETCH-LOGICAL-c633-7dc529caaaeacc1e98d808026e90f75506992ee5ddce1af3c842fa531244b7173</originalsourceid><addsrcrecordid>eNpNkLtOwzAUhi0EEqXwAEgMfoEUX-IkHksvUKmUgUiwRQfnGBnSGtnmNvHqJCoD0y_9t-Ej5JyzCedMX95uFvVEMJFPpOK61PKAjLhSVcZV8XhIRqzSLKtYnh-TkxhfGOO5kmJEfuaY0CTnd9RbOvNd9x7dB9LVLmHAmOiy8751u2c6TQnMa6R9cwNbbOkcEtANpk8fevsKYu_14YMPLV18pQD7W-sDrd0W6T0Gh5HOOojRWWdgiE_JkYUu4tmfjkm9XNSzm2x9d72aTdeZKaTMytYooQ0AIBjDUVdtxSomCtTMlkqxQmuBqNrWIAcrTZULC0pykedPJS_lmPD9rQk-xoC2eQtuC-G74awZADYDwGYA2PwB7DcX-41DxH_9ijPFpPwFDF9u6g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</title><source>IEEE Electronic Library (IEL)</source><creator>Huang, Ying ; Hou, Rui ; Xing, Guanglin ; Dong, Mianxiong ; Ota, Kaoru ; Zeng, Deze</creator><creatorcontrib>Huang, Ying ; Hou, Rui ; Xing, Guanglin ; Dong, Mianxiong ; Ota, Kaoru ; Zeng, Deze</creatorcontrib><description>Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks.</description><identifier>ISSN: 0890-8044</identifier><identifier>EISSN: 1558-156X</identifier><identifier>DOI: 10.1109/MNET.2024.3519793</identifier><identifier>CODEN: IENEET</identifier><language>eng</language><publisher>IEEE</publisher><subject>Accuracy ; Collusive interest flooding attack ; Feature extraction ; Monitoring ; Named data network ; Prevention and mitigation ; Quality of service ; Simulation ; TCPIP ; Telecommunication traffic ; Time factors ; Time series analysis ; Time series classification algorithm ; WEASEL</subject><ispartof>IEEE network, 2024-12, p.1-1</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0002-3382-1652 ; 0000-0001-7607-782X ; 0000-0002-2788-3451 ; 0000-0003-3276-1202</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10810503$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27906,27907,54740</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10810503$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Huang, Ying</creatorcontrib><creatorcontrib>Hou, Rui</creatorcontrib><creatorcontrib>Xing, Guanglin</creatorcontrib><creatorcontrib>Dong, Mianxiong</creatorcontrib><creatorcontrib>Ota, Kaoru</creatorcontrib><creatorcontrib>Zeng, Deze</creatorcontrib><title>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</title><title>IEEE network</title><addtitle>NET-M</addtitle><description>Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks.</description><subject>Accuracy</subject><subject>Collusive interest flooding attack</subject><subject>Feature extraction</subject><subject>Monitoring</subject><subject>Named data network</subject><subject>Prevention and mitigation</subject><subject>Quality of service</subject><subject>Simulation</subject><subject>TCPIP</subject><subject>Telecommunication traffic</subject><subject>Time factors</subject><subject>Time series analysis</subject><subject>Time series classification algorithm</subject><subject>WEASEL</subject><issn>0890-8044</issn><issn>1558-156X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkLtOwzAUhi0EEqXwAEgMfoEUX-IkHksvUKmUgUiwRQfnGBnSGtnmNvHqJCoD0y_9t-Ej5JyzCedMX95uFvVEMJFPpOK61PKAjLhSVcZV8XhIRqzSLKtYnh-TkxhfGOO5kmJEfuaY0CTnd9RbOvNd9x7dB9LVLmHAmOiy8751u2c6TQnMa6R9cwNbbOkcEtANpk8fevsKYu_14YMPLV18pQD7W-sDrd0W6T0Gh5HOOojRWWdgiE_JkYUu4tmfjkm9XNSzm2x9d72aTdeZKaTMytYooQ0AIBjDUVdtxSomCtTMlkqxQmuBqNrWIAcrTZULC0pykedPJS_lmPD9rQk-xoC2eQtuC-G74awZADYDwGYA2PwB7DcX-41DxH_9ijPFpPwFDF9u6g</recordid><startdate>20241219</startdate><enddate>20241219</enddate><creator>Huang, Ying</creator><creator>Hou, Rui</creator><creator>Xing, Guanglin</creator><creator>Dong, Mianxiong</creator><creator>Ota, Kaoru</creator><creator>Zeng, Deze</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-3382-1652</orcidid><orcidid>https://orcid.org/0000-0001-7607-782X</orcidid><orcidid>https://orcid.org/0000-0002-2788-3451</orcidid><orcidid>https://orcid.org/0000-0003-3276-1202</orcidid></search><sort><creationdate>20241219</creationdate><title>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</title><author>Huang, Ying ; Hou, Rui ; Xing, Guanglin ; Dong, Mianxiong ; Ota, Kaoru ; Zeng, Deze</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c633-7dc529caaaeacc1e98d808026e90f75506992ee5ddce1af3c842fa531244b7173</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Collusive interest flooding attack</topic><topic>Feature extraction</topic><topic>Monitoring</topic><topic>Named data network</topic><topic>Prevention and mitigation</topic><topic>Quality of service</topic><topic>Simulation</topic><topic>TCPIP</topic><topic>Telecommunication traffic</topic><topic>Time factors</topic><topic>Time series analysis</topic><topic>Time series classification algorithm</topic><topic>WEASEL</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Ying</creatorcontrib><creatorcontrib>Hou, Rui</creatorcontrib><creatorcontrib>Xing, Guanglin</creatorcontrib><creatorcontrib>Dong, Mianxiong</creatorcontrib><creatorcontrib>Ota, Kaoru</creatorcontrib><creatorcontrib>Zeng, Deze</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE network</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huang, Ying</au><au>Hou, Rui</au><au>Xing, Guanglin</au><au>Dong, Mianxiong</au><au>Ota, Kaoru</au><au>Zeng, Deze</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification</atitle><jtitle>IEEE network</jtitle><stitle>NET-M</stitle><date>2024-12-19</date><risdate>2024</risdate><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>0890-8044</issn><eissn>1558-156X</eissn><coden>IENEET</coden><abstract>Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious collusive coproducers, its appearance is similar to that of normal network traffic, thus making it more stealthy and more difficult to detect. The traditional attack detection approaches applied for IFA have limitations in terms of accurately and efficiently identifying CIFA. Inspired by the different appearances and characteristics of normal and attack network traffic, as well as the time series nature of network traffic, we use time series classification (TSC) techniques to capture the network traffic features of CIFA to achieve the goal of precise and efficient detection. Therefore, in this paper, a Word ExtrAction for time SEries cLassification (WEASEL)-based CIFA detection scheme is proposed. To our knowledge, no TSC-related methods have been applied to CIFA detection. The simulation results show that the proposed scheme can achieve a detection rate of 98.72%, a false alarm rate (FAR) of 0.82%, and a missed detection rate (MAR) of 1.27% in comparisons with several typical detection schemes, thus verifying its accuracy and efficiency in CIFA detection tasks.</abstract><pub>IEEE</pub><doi>10.1109/MNET.2024.3519793</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-3382-1652</orcidid><orcidid>https://orcid.org/0000-0001-7607-782X</orcidid><orcidid>https://orcid.org/0000-0002-2788-3451</orcidid><orcidid>https://orcid.org/0000-0003-3276-1202</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0890-8044
ispartof IEEE network, 2024-12, p.1-1
issn 0890-8044
1558-156X
language eng
recordid cdi_ieee_primary_10810503
source IEEE Electronic Library (IEL)
subjects Accuracy
Collusive interest flooding attack
Feature extraction
Monitoring
Named data network
Prevention and mitigation
Quality of service
Simulation
TCPIP
Telecommunication traffic
Time factors
Time series analysis
Time series classification algorithm
WEASEL
title Detection of Collusive Interest Flooding Attacks on Named Data Networks Based on Word Extraction for Time Series Classification
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T09%3A07%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20Collusive%20Interest%20Flooding%20Attacks%20on%20Named%20Data%20Networks%20Based%20on%20Word%20Extraction%20for%20Time%20Series%20Classification&rft.jtitle=IEEE%20network&rft.au=Huang,%20Ying&rft.date=2024-12-19&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=0890-8044&rft.eissn=1558-156X&rft.coden=IENEET&rft_id=info:doi/10.1109/MNET.2024.3519793&rft_dat=%3Ccrossref_RIE%3E10_1109_MNET_2024_3519793%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10810503&rfr_iscdi=true