Font Size: a A A

Research On Key Technologies Of IFA Defense In Named Data Networking

Posted on:2021-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:M HanFull Text:PDF
GTID:2518306197993379Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the vigorous development of information technology,the volume of Internet services and users has increased dramatically.The current Internet data storage model,sharing method,forwarding mechanism,service quality,and users' increasing demand for networks have become the main contradictions in the current development of Internet technology.Different from the current way of obtaining information based on IP protocol,Internet users in the future will pay more attention to the content of data information rather than the location where it is stored.Therefore,the information search method based on data content will be the main feature of the future Internet architecture.As one of the typical representative of next-generation Internet architecture: Information-centric Networking(ICN),with its unique way of resource sharing method that takes the name of data information as the object,has changed the present situation of Information retrieval based on IP.Named Data Networking(NDN)as one of the implementation scheme of ICN,has demonstrated its superiority in terms of naming,storing,forwarding,mobility,and security of information content.As a new type of network framework,network security is one of the key areas of current NDN research.Among them,Interest Flooding Attack(IFA)is a distributed denial of service attack in NDN.When an attacker initiates an IFA,a large number of data request packets(Interest packet)will be sent to NDN to request the presence or absence of data content,resulting in the full storage space of routers' pending interest table(PIT),large consumption of the network bandwidth,which cause problems such as rejected requests of normal users and exhaustion of network resources,which seriously affect the quality of network services.In view of this,this article takes IFA as the research object and focuses on the design of IFA's defense program.The details are as follows:The principles of NDN naming rules,data types,forwarding mechanism and network characteristics are expounded;the attack principle,network behavior analysis and attack characteristics of IFA are given;and the research on IFA field at home and abroad is explained.An improved IFA defense method based on information entropy is proposed.Based on information entropy,this method introduces the concept of reputation value,and uses the reputation value of users connected to the edge router to determine the user type for IFA detection and mitigation.Compared with the IFA defense method based on information entropy,which has been approved at present,it effectively overcomes the shortcomings of information entropy to deal with single attack types,and at the same time guarantees high detection accuracy and defense stability.An IFA defense method based on the theil index is proposed.This method groups Interest packets received by the router,and performs statistical calculations between groups and within groups to obtain the theil index value,and then uses this to determine the attack.Then,the Interest backtracking method is used to alleviate IFA.Simulation experiments show that this method has higher accuracy and timeliness than existing typical IFA detection methods,and can respond to many different types of IFA attacks,thereby improving the efficiency of IFA detection and mitigation.
Keywords/Search Tags:Information-centric Networking, Named Data Networking, Interest Flooding Attack
PDF Full Text Request
Related items