期刊文献+

改进的CCN兴趣包泛洪攻击防御方法 被引量:4

Improved defense method for interest flooding attack in CCN
下载PDF
导出
摘要 为了提高内容中心网络(CCN)防御兴趣包泛洪攻击(IFA)的能力,针对不同防御方法进行了研究,提出一种改进的CCN兴趣包泛洪攻击防御方法。该方法根据CCN流平衡原理,采用恶意前缀溯源的方式,实现对IFA的快速检测,并通过改进和式增加积式减少(additive increase multi-plicative decrease,AIMD)算法,实现对IFA的防御。安全性分析表明,该方法在面对IFA时,能够更快地做出反应;并且相比于其他IFA防御方法,该方法在保证安全性的前提下,降低了CCN路由器在检测IFA时的计算开销。 In order to improve the ability of CCN to defend against IFA,this paper studied different defense methods and proposed an improved defense method for IFA in CCN.According to the CCN flow balance principle,the me-thod used the me-thod of malicious prefix tracing to achieve fast detection of IFA,and achieved the defense against IFA by improving the AIMD algorithm.The security analysis shows that the proposed method can defend faster when it in the face of IFA.Compared with other defense methods,this method reduces the computational cost of the CCN router when detecting IFA under the premise of ensuring security.
作者 吴浔 凌捷 Wu Xun;Ling Jie(School of Computer,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机应用研究》 CSCD 北大核心 2020年第4期1132-1135,共4页 Application Research of Computers
基金 广东省科技计划资助项目(2017B090906003) 广州市重大科技专项资助项目(201604010063,201802010043,201807010058)。
关键词 兴趣包泛洪攻击 恶意前缀溯源 内容中心网络 interesting flooding attack malicious prefix traceability content-centric networking(CCN) interest flooding attack(IFA)
  • 相关文献

参考文献3

二级参考文献20

  • 1Jacobson V,Smetters D K,Thornton J D. Networking named content[A].Rome,Italy,2009.1-12. 被引量:1
  • 2Zhang L,Jacobson V,Estrin D. Named Data Networking(NDN)Project[Technical Report NDN-0001][R].NDN,2010. 被引量:1
  • 3Yi C,Afanasyev A,Moiseenko I. A case for stateful forwarding plane[J].Computer Communications,2013,(07):779-791. 被引量:1
  • 4Perino D,Varvello M. A reality check for content centric networking[A].Toronto,Ontario,Canada,2011.44-49. 被引量:1
  • 5W?hlisch M,Schmidt T C,Vahlenkamp M. Backscatter from the data plane threats to stability and security in information-centric networking[Technical Report 1205.4778][R].ArXiv eprint,2012. 被引量:1
  • 6Lauinger T. Security & Scalability of content-centric networking[D].TU Darmstadt,Schwetzingen,Germany,2010. 被引量:1
  • 7Gasti P,Tsudik G,Uzun E. DoS and DDoS in named-data networking[Technical Report 1208.0952][R].ArXiv eprint,2012. 被引量:1
  • 8Afanasyev A,Mahadevan P,Moiseenko I. Interest flooding attack and countermeasures in named data networking[A].New York,USA,2013.1-9. 被引量:1
  • 9Compagno A,Conti M,Gasti P. Poseidon:mitigating interest flooding DDoS attacks in named data networking[Technical Report 1303.4823][R].ArXiv eprint,2013. 被引量:1
  • 10Wang Kai,Zhou Hua-chun,Luo Hong-bin. Detecting and mitigating interest flooding attacks in content-centric network[J].Security and Communication Networks,2014,(04):685-699. 被引量:1

共引文献11

同被引文献39

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部