Abstract
Due to the advantages of multi-source, multi-path, and in-network caching, Named Data Networking (NDN) can improve the efficiency of data exchange in Vehicular Ad-hoc NETworks (VANETs). As Vehicular Named Data Networking (VNDN) has become a new paradigm for connected vehicles, it also introduces a new security issue. Since VNDN follows the ‘request-response’ communication mode, malicious nodes can flood many interest packets to occupy resources, block the network, and damage intelligent transportation applications. Therefore, fast detection of Interest Flooding Attacks (IFA) is an urgent problem in VNDN. Some researchers have transplanted the IFA detection methods in NDN to VNDN, but there are still defects such as single detection category, low accuracy rate, and high overhead. Aiming at the above defects, an IFA detection method based on machine learning is proposed and named SmartBuoy. The contribution of our work lies in the following three points. Firstly, we present an IFA traffic generation method based on three simulation tools and construct a fine-grained dataset by building a dynamic directional interface model (DDIM). Secondly, by analyzing the traffic through directional interfaces, we propose 22 new features for IFA detection. Finally, we design a Two-Stage Two-Dimension feature selection algorithm (TSTD) to construct the optimal feature subset for a selected classifier with a specified number of features. We have verified the effectiveness of SmartBuoy through experiments. The results show that: (1) Compared with the rule-based methods, SmartBuoy can obtain a higher detection accuracy. (2) The new features designed according to DDIM can improve the performance of classifiers. (3) TSTD can help classifiers achieve higher accuracy than the other two classical algorithms with a specified number of features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdullah, M., Raza, I., Zia, T., Hussain, S.A.: Interest flooding attack mitigation in a vehicular named data network. IET Intell. Transp. Syst. 15(4), 525–537 (2021)
Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., Zhang, L.: Interest flooding attack and countermeasures in named data networking. In: 2013 IFIP Networking Conference, pp. 1–9. IEEE (2013)
Compagno, A., Conti, M., Gasti, P., Tsudik, G.: Poseidon: mitigating interest flooding DDOS attacks in named data networking. In: 38th Annual IEEE Conference on Local Computer Networks, pp. 630–638. IEEE (2013)
Dong, J., Wang, K., Quan, W., Yin, H.: Interestfence: simple but efficient way to counter interest flooding attack. Comput. Secur. 88, 101628 (2020)
Fang, C., Yao, H., Wang, Z., Wu, W., Jin, X., Yu, F.R.: A survey of mobile information-centric networking: research issues and challenges. IEEE Commun. Surv. Tutor. 20(3), 2353–2371 (2018)
Hou, R., et al.: Theil-based countermeasure against interest flooding attacks for named data networks. IEEE Netw. 33(3), 116–121 (2019)
Khelifi, H., et al.: Named data networking in vehicular ad hoc networks: state-of-the-art and challenges. IEEE Commun. Surv. Tutor. 22(1), 320–351 (2019)
Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of sumo-simulation of urban mobility. Int. J. Adv. Syst. Meas. 5(3 &4) (2012)
Kumar, N., Singh, A.K., Srivastava, S.: Feature selection for interest flooding attack in named data networking. Int. J. Comput. Appl. 43(6), 537–546 (2021)
Mastorakis, S., Afanasyev, A., Zhang, L.: On the evolution of ndnSIM: an open-source simulator for NDN experimentation. ACM SIGCOMM Comput. Commun. Rev. 47(3), 19–33 (2017)
Rabari, J., Kumar, A.R.P.: FIFA: fighting against interest flooding attack in NDN-based VANET. In: 2021 International Wireless Communications and Mobile Computing (IWCMC), pp. 1539–1544. IEEE (2021)
Wang, R., Xu, Z., Zhao, X., Hu, J.: V2V-based method for the detection of road traffic congestion. IET Intell. Transp. Syst. 13(5), 880–885 (2019)
Wang, X., Li, Y.: Vehicular named data networking framework. IEEE Trans. Intell. Transp. Syst. 21(11), 4705–4714 (2020). https://doi.org/10.1109/TITS.2019.2945784
Wu, W., et al.: A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 21(3), 919–933 (2020). https://doi.org/10.1109/TITS.2019.2908074
Xing, G., et al.: Isolation forest-based mechanism to defend against interest flooding attacks in named data networking. IEEE Commun. Mag. 59(3), 98–103 (2021)
Zhang, L., et al.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66–73 (2014)
Zhang, X., Li, R.: An ARI-HMM based interest flooding attack countermeasure in NDN. In: 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 10–15. IEEE (2019)
Zhang, X., Li, R., Hou, W.: Attention-based LSTM model for IFA detection in named data networking. Secur. Commun. Netw. 2022 (2022)
Zhi, T., Liu, Y., Wang, J., Zhang, H.: Resist interest flooding attacks via entropy-SVM and Jensen-Shannon divergence in information-centric networking. IEEE Syst. J. 14(2), 1776–1787 (2019)
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 61702288, and in part by the Fundamental Research Funds for the Central Universities under Grant 2242023K30034.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xu, Y., Zhang, T., Zeng, J., Wang, R., Song, K., Xu, J. (2024). SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN. In: Wang, G., Wang, H., Min, G., Georgalas, N., Meng, W. (eds) Ubiquitous Security. UbiSec 2023. Communications in Computer and Information Science, vol 2034. Springer, Singapore. https://doi.org/10.1007/978-981-97-1274-8_16
Download citation
DOI: https://doi.org/10.1007/978-981-97-1274-8_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-1273-1
Online ISBN: 978-981-97-1274-8
eBook Packages: Computer ScienceComputer Science (R0)