Collusion interest flooding attack detection method for vehicle-mounted named data network

The invention provides a collusion interest flooding attack detection method for a vehicle-mounted named data network. Through analysis of a CIFA attack model, it is found that the CIFA attack model has the advantages of being short in time, high in frequency, intermittent, long in PIT entry existen...

Full description

Saved in:
Bibliographic Details
Main Authors LI SIRUI, ZOU XIAOMIN, ZHU YISHUI, DUAN ZONGTAO, WANG QINGLONG, WANG LUYANG, FAN NA
Format Patent
LanguageChinese
English
Published 23.07.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention provides a collusion interest flooding attack detection method for a vehicle-mounted named data network. Through analysis of a CIFA attack model, it is found that the CIFA attack model has the advantages of being short in time, high in frequency, intermittent, long in PIT entry existence time and high in PIT utilization rate. According to the characteristics, the invention provides a multi-weight comprehensive detection method, the network flow change is monitored through a road side infrastructure RSU, and on the basis, the accurate detection of the CIFA is realized by combining the characteristics of PIT existence time and considering the PIT utilization rate and the interest packet satisfaction rate at the same time. In addition, a block chain technology is combined, and the RSU forms a block chain network for maintaining a global vehicle blacklist. Then, the RSU broadcasts the blacklist to the legal vehicle, and the legal vehicle refuses to receive the interest packet from the blacklist vehi
Bibliography:Application Number: CN202011368390