iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-981-97-1274-8_16
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN | SpringerLink
Skip to main content

SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN

  • Conference paper
  • First Online:
Ubiquitous Security (UbiSec 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2034))

Included in the following conference series:

  • 338 Accesses

Abstract

Due to the advantages of multi-source, multi-path, and in-network caching, Named Data Networking (NDN) can improve the efficiency of data exchange in Vehicular Ad-hoc NETworks (VANETs). As Vehicular Named Data Networking (VNDN) has become a new paradigm for connected vehicles, it also introduces a new security issue. Since VNDN follows the ‘request-response’ communication mode, malicious nodes can flood many interest packets to occupy resources, block the network, and damage intelligent transportation applications. Therefore, fast detection of Interest Flooding Attacks (IFA) is an urgent problem in VNDN. Some researchers have transplanted the IFA detection methods in NDN to VNDN, but there are still defects such as single detection category, low accuracy rate, and high overhead. Aiming at the above defects, an IFA detection method based on machine learning is proposed and named SmartBuoy. The contribution of our work lies in the following three points. Firstly, we present an IFA traffic generation method based on three simulation tools and construct a fine-grained dataset by building a dynamic directional interface model (DDIM). Secondly, by analyzing the traffic through directional interfaces, we propose 22 new features for IFA detection. Finally, we design a Two-Stage Two-Dimension feature selection algorithm (TSTD) to construct the optimal feature subset for a selected classifier with a specified number of features. We have verified the effectiveness of SmartBuoy through experiments. The results show that: (1) Compared with the rule-based methods, SmartBuoy can obtain a higher detection accuracy. (2) The new features designed according to DDIM can improve the performance of classifiers. (3) TSTD can help classifiers achieve higher accuracy than the other two classical algorithms with a specified number of features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdullah, M., Raza, I., Zia, T., Hussain, S.A.: Interest flooding attack mitigation in a vehicular named data network. IET Intell. Transp. Syst. 15(4), 525–537 (2021)

    Article  Google Scholar 

  2. Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E., Zhang, L.: Interest flooding attack and countermeasures in named data networking. In: 2013 IFIP Networking Conference, pp. 1–9. IEEE (2013)

    Google Scholar 

  3. Compagno, A., Conti, M., Gasti, P., Tsudik, G.: Poseidon: mitigating interest flooding DDOS attacks in named data networking. In: 38th Annual IEEE Conference on Local Computer Networks, pp. 630–638. IEEE (2013)

    Google Scholar 

  4. Dong, J., Wang, K., Quan, W., Yin, H.: Interestfence: simple but efficient way to counter interest flooding attack. Comput. Secur. 88, 101628 (2020)

    Google Scholar 

  5. Fang, C., Yao, H., Wang, Z., Wu, W., Jin, X., Yu, F.R.: A survey of mobile information-centric networking: research issues and challenges. IEEE Commun. Surv. Tutor. 20(3), 2353–2371 (2018)

    Article  Google Scholar 

  6. Hou, R., et al.: Theil-based countermeasure against interest flooding attacks for named data networks. IEEE Netw. 33(3), 116–121 (2019)

    Article  Google Scholar 

  7. Khelifi, H., et al.: Named data networking in vehicular ad hoc networks: state-of-the-art and challenges. IEEE Commun. Surv. Tutor. 22(1), 320–351 (2019)

    Article  Google Scholar 

  8. Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of sumo-simulation of urban mobility. Int. J. Adv. Syst. Meas. 5(3 &4) (2012)

    Google Scholar 

  9. Kumar, N., Singh, A.K., Srivastava, S.: Feature selection for interest flooding attack in named data networking. Int. J. Comput. Appl. 43(6), 537–546 (2021)

    Google Scholar 

  10. Mastorakis, S., Afanasyev, A., Zhang, L.: On the evolution of ndnSIM: an open-source simulator for NDN experimentation. ACM SIGCOMM Comput. Commun. Rev. 47(3), 19–33 (2017)

    Article  Google Scholar 

  11. Rabari, J., Kumar, A.R.P.: FIFA: fighting against interest flooding attack in NDN-based VANET. In: 2021 International Wireless Communications and Mobile Computing (IWCMC), pp. 1539–1544. IEEE (2021)

    Google Scholar 

  12. Wang, R., Xu, Z., Zhao, X., Hu, J.: V2V-based method for the detection of road traffic congestion. IET Intell. Transp. Syst. 13(5), 880–885 (2019)

    Article  Google Scholar 

  13. Wang, X., Li, Y.: Vehicular named data networking framework. IEEE Trans. Intell. Transp. Syst. 21(11), 4705–4714 (2020). https://doi.org/10.1109/TITS.2019.2945784

    Article  Google Scholar 

  14. Wu, W., et al.: A survey of intrusion detection for in-vehicle networks. IEEE Trans. Intell. Transp. Syst. 21(3), 919–933 (2020). https://doi.org/10.1109/TITS.2019.2908074

    Article  MathSciNet  Google Scholar 

  15. Xing, G., et al.: Isolation forest-based mechanism to defend against interest flooding attacks in named data networking. IEEE Commun. Mag. 59(3), 98–103 (2021)

    Article  Google Scholar 

  16. Zhang, L., et al.: Named data networking. ACM SIGCOMM Comput. Commun. Rev. 44(3), 66–73 (2014)

    Article  Google Scholar 

  17. Zhang, X., Li, R.: An ARI-HMM based interest flooding attack countermeasure in NDN. In: 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 10–15. IEEE (2019)

    Google Scholar 

  18. Zhang, X., Li, R., Hou, W.: Attention-based LSTM model for IFA detection in named data networking. Secur. Commun. Netw. 2022 (2022)

    Google Scholar 

  19. Zhi, T., Liu, Y., Wang, J., Zhang, H.: Resist interest flooding attacks via entropy-SVM and Jensen-Shannon divergence in information-centric networking. IEEE Syst. J. 14(2), 1776–1787 (2019)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61702288, and in part by the Fundamental Research Funds for the Central Universities under Grant 2242023K30034.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuwei Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, Y., Zhang, T., Zeng, J., Wang, R., Song, K., Xu, J. (2024). SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN. In: Wang, G., Wang, H., Min, G., Georgalas, N., Meng, W. (eds) Ubiquitous Security. UbiSec 2023. Communications in Computer and Information Science, vol 2034. Springer, Singapore. https://doi.org/10.1007/978-981-97-1274-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-1274-8_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-1273-1

  • Online ISBN: 978-981-97-1274-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics