Font Size: a A A

Research And Implementation On The Surveillance Technology Of Interest Flooding Attack Based On Data Name

Posted on:2015-06-09Degree:MasterType:Thesis
Country:ChinaCandidate:S Y LeFull Text:PDF
GTID:2298330422482029Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Since Palo Alto Research Cente,represented by Professor Van Jacobson,proposed thenext-generation network architecture named data networking(NDN) in2009,a growingnumber of research institutions and universities are engaging in the research of NDN.Theresearch invovles in the NDN name、data cenric secrity、routing and forwarding、caching andso on.Distributed Denial of Service Attack is widely recognized a exiting threat in NDN.Theinterest flooding attack(IFA),a major type of NDN specific DDoS attacks,aims to overwhelmthe network resource and prevent the legitimate interest in getting corresponding service bygenerates a large number of illegitimate interest.In recently,router statics and push-back mechanism are regarded tentativecountermeasures to prevent interest flooding attack.In the paper,I innovativly use interestpackage satisfaction rate based on data name to monitor interest flooding attack. Whencountering the statics about the interest package satisfaction,the papre use two differentimplementation—Name Prefix Trie(NPT) and Name Component Encoding(NCE).To differthe attack trafic and limit the attack trafic,this paper proposed two major surveillancetechnology,which combine the statics of interest package satisfaction rate based on data namewith push-back mechanism.One is trafic filtering and the other is trafic limiting.At last,the paper realizes both surveillance technologies on ndnSIM,a propolar simulatoron researching NDN. Fortunately,both surveillance techonolgy are effectively after ourexperiment.What’s more,the paper discusses the related factor impacting on the effectivenessand the time performance between NPT and NCE.
Keywords/Search Tags:Named Data Networking(NDN), Content-Centric Networking(CCN), interestflooding attack(IFA), Name Prefiex Trie(NPT), Name Component Encoding(NCE)
PDF Full Text Request
Related items