Font Size: a A A

Research On Detection And Defense Of IFA In Named Data Networking

Posted on:2017-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:J Y ZhouFull Text:PDF
GTID:2308330482487266Subject:Information security
Abstract/Summary:PDF Full Text Request
In recent years, many scholars have focused on the research of the next generation network. Under this background, the named data networking (NDN) have been proposed. The main significance of the NDN lies in constructing a new architecture content oriented data driven model. The model caters to the trend of the development of network. Maybe, the NDN will replace the TCP/IP network in the future. Meanwhile, being a new type of network architecture, the safety problem of the NDN equally worthy of attention. Though many existed attack modes don’t work in NDN. A newborn attack named Interest flooding attack can do great harm to it. The attack can take great advantage of the loophole of NDN and using large amount of fake packages to exhaust the network resource.Considering the harm of IFA, we have done the following work:Firstly, introducing the framework of the NDN and using it to analysis its influence to the network. Conclude the feature of IFA and evaluate the existing countermeasures. Compare the countermeasures and analysis the advantages and disadvantages of them. Secondly, propose an improvement scheme of the Interest by marking the source interface. When the IFA happens we can rapidly find out the attack source.Thirdly, using the features of IFA constructing the evaluation index. By analyzing their influence degree to NDN make weights to the evaluation indexes. Using fuzzy comprehensive evaluation to judge the network whether being attacked. Propose the scheme of limiting the speed of the interface to defend the IFA and Adding a decision condition to the scheme. By using the decision condition the legal user won’t be affected when the scheme works.Finally, use great topology to simulate the defend scheme. The PIT occupation rate and the Interest non-response rate will be the evaluation index to prove the scheme’s feasibility and advanced. In this paper, we include 26 figures,11 tables, and 50 references.
Keywords/Search Tags:Named Data Networking, fuzzy Comprehensive Evaluation, Weight Analysis, Network Security
PDF Full Text Request
Related items