LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Karami, Amin; Guerrero-Zapata, Manel (2015)
Publisher: Elsevier
Languages: English
Types: Article
Subjects: False-locality, ANFIS, Cache replacement, Computer networks -- Security measures, Locality-disruption, Named Data Networking, :Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors [Àrees temàtiques de la UPC], Ordinadors, Xarxes d' -- Mesures de seguretat

Classified by OpenAIRE into

ACM Ref: Hardware_MEMORYSTRUCTURES
Named Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network caching is a key NDN feature. However, pervasive caching strengthens security problems namely cache pollution attacks including cache poisoning (i.e., introducing malicious content into caches as false-locality) and cache pollution (i.e., ruining the cache locality with new unpopular content as locality-disruption). In this paper, a new cache replacement method based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is presented to mitigate the cache pollution attacks in NDN. The ANFIS structure is built using the input data related to the inherent characteristics of the cached content and the output related to the content type (i.e., healthy, locality-disruption, and false-locality). The proposed method detects both false-locality and locality-disruption attacks as well as a combination of the two on different topologies with high accuracy, and mitigates them efficiently without very much computational cost as compared to the most common policies. Peer Reviewed
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.. Networking named content. In: Proceedings of the 5th international conference on Emerging networking experiments and technologies. ACM; 2009, p. 1 - 12.
    • [2] Zhang, G., Li, Y., Lin, T.. Caching in information centric networking: A survey. Computer Networks 2013;57(16):3128 - 3141.
    • [3] Sourlas, V., Flegkas, P., Tassiulas, L.. A novel cache aware routing scheme for information-centric networks. Computer Networks 2014;59:44 - 61.
    • [4] Karami, A., Guerrero-Zapata, M.. A fuzzy anomaly detection system based on hybrid pso-kmeans algorithm in content-centric networks. Neurocomputing 2015;149(Part C):1253 - 1269.
    • [5] qing Wang, G., Huang, T., Liu, J., ya Chen, J., jie Liu, Y.. Modeling in-network caching and bandwidth sharing performance in information-centric networking. The Journal of China Universities of Posts and Telecommunications 2013;20(2):99 - 105.
    • [6] Dannewitz, C., Kutscher, D., Ohlman, B., Farrell, S., Ahlgren, B., Karl, H.. Network of information (netinf) an informationcentric networking architecture. Computer Communications 2013;36(7):721 - 735.
    • [7] Zhang, L., Estrin, D., Burke, J., Jacobson, V., Thornton, J., Smetters, D.K., et al. Named data networking (ndn) project. Tech. Rep. PARC TR-2010-3; Palo Alto Research Center; 2010.
    • [8] Karami, A., Guerrero-Zapata, M.. A hybrid multiobjective rbfpso method for mitigating dos attacks in named data networking. Neurocomputing 2015;151(Part 3):1262 - 1282.
    • [9] Chaabane, A., Cristofaro, E.D., Kaafar, M.A., Uzun, E.. Privacy in content-oriented networking: Threats and countermeasures. ACM SIGCOMM Computer Communication Review 2013;43(3):25 - 33.
    • [10] Acs, G., Conti, M., Gasti, P., Ghali, C., Tsudik, G.. Cache privacy in named-data networking. In: 33rd IEEE International Conference on Distributed Computing Systems (ICDCS). 2013, p. 41 - 51.
    • [11] Lee, H., Nakao, A.. User-assisted in-network caching in information-centric networking. Computer Networks 2013;57(16):3142 - 3153.
    • [12] Kim, Y., Yeom, I.. Performance analysis of in-network caching for content-centric networking. Computer Networks 2013;57(13):2465 - 2482.
    • [13] Carofiglio, G., Gallo, M., Muscariello, L.. On the performance of bandwidth and storage sharing in information-centric networks. Computer Networks 2013;57(17):3743 - 3758.
    • [14] Chai, W.K., He, D., Psaras, I., Pavlou, G.. Cache less for more in information-centric networks (extended version). Computer Communications 2013;36(7):758 - 770.
    • [15] Xylomenos, G., Ververidis, C.N., Siris, V.A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., et al. A survey of informationcentric networking research. IEEE Communications Surveys Tutorials 2013;:1 - 26.
    • [16] Lauinger, T., Laoutaris, N., Rodriguez, P., Strufe, T., Biersack, E., Kirda, E.. Privacy risks in named data networking: what is the cost of performance? ACM SIGCOMM Computer Communication Review 2012;42(5):54 - 57.
    • [17] Xie, M., Widjaja, I., Wang, H.. Enhancing cache robustness for content-centric networking. In: IEEE Proceedings on INFOCOM. 2012, p. 2426 - 2434.
    • [18] Park, H., Widjaja, I., Lee, H.. Detection of cache pollution attacks using randomness checks. In: IEEE International Conference on Communications (ICC). 2012, p. 1096 - 1100.
    • [19] Ghali, C., Tsudik, G., Uzun, E.. Needle in a haystack: Mitigating content poisoning in named-data networking. In: Proceedings of NDSS Workshop on Security of Emerging Networking Technologies (SENT). 2014,.
    • [20] Conti, M., Gasti, P., Teoli, M.. A lightweight mechanism for detection of cache pollution attacks in named data networking. Computer Networks 2013;57(16):3178 - 3191.
    • [21] Chen, H., Xiao, Y., Vrbsky, S.V.. An update-based step-wise optimal cache replacement for wireless data access. Computer Networks 2013;57(1):197 - 212.
    • [22] Deng, L., Gao, Y., Chen, Y., Kuzmanovic, A.. Pollution attacks and defenses for internet caching systems. Computer Networks 2008;52(5):935-956.
    • [23] Kaya, C.C., Zhang, G., Tan, Y., Mookerjee, V.S.. An admission-control technique for delay reduction in proxy caching. Decision Support Systems 2009;46(2):594 - 603.
    • [24] Romano, S., ElAarag, H.. A neural network proxy cache replacement strategy and its implementation in the squid proxy server. Neural Computing and Applications 2011;20(1):59 - 78.
    • [25] Ahmed, W.A., Shamsuddin, S.M.. Neuro-fuzzy system in partitioned client-side web cache. Expert Systems with Applications 2011;38:14715 - 14725.
    • [26] Bagheri, A., Peyhani, H.M., Akbari, M.. Financial forecasting using anfis networks with quantum-behaved particle swarm optimization. Expert Systems With Applications 2014;41(14):6235 - 6250.
    • [27] Budyal, V., Manvi, S.. Anfis and agent based bandwidth and delay aware anycast routing in mobile ad hoc networks. Journal of Network and Computer Applications 2014;39:140 - 151.
    • [28] G u¨neri, A.F., Ertay, T., Y u¨cel, A.. An approach based on anfis input selection and modeling for supplier selection problem. Expert Systems With Applications 2011;38:14907 - 14917.
    • [29] Moayer, S., Bahri, P.A.. Hybrid intelligent scenario generator for business strategic planning by using anfis. Expert Systems With Applications 2009;36:7729 - 7737.
    • [30] Guillaume, S.. Designing fuzzy inference systems from data: an interpretability-oriented review. IEEE Transactions on Fuzzy Systems 2001;9(3):426 - 443.
    • [31] Naderloo, L., Alimardani, R., Omid, M., Sarmadian, F., Javadikia, P., Torabi, M.Y., et al. Application of fANFISg to predict crop yield based on di erent energy inputs. Measurement 2012;45(6):1406 - 1413.
    • [32] Compagno, A., Conti, M., Gasti, P., Tsudik, G.. Poseidon: Mitigating interest flooding ddos attacks in named data networking. In: 38th Annual IEEE Conference on Local Computer Networks (LCN). 2013, p. 630 - 638.
    • [33] Jang, J.S.. Anfis: adaptive-network-based fuzzy inference system. IEEE Transactions on Systems, Man and Cybernetics 1993;23(3):665 - 685.
    • [34] Singh, R., Kainthola, A., Singh, T.. Estimation of elastic constant of rocks using an fANFISg approach. Applied Soft Computing 2012;12(1):40 - 45.
    • [35] Jiang, H., Kwong, C., Ip, W., Wong, T.. Modeling customer satisfaction for new product development using a pso-based fANFISg approach. Applied Soft Computing 2012;12(2):726 - 734.
    • [36] Jang, J.S.. Neuro-fuzzy modeling: Architectures, analyses, and applications. Ph.D. thesis; University of California, Berkeley; 1992.
    • [37] Vakali, A.. Evolutionary techniques for web caching. Distributed and Parallel Databases 2002;11(1):93 - 116.
    • [38] Gao, Y., Deng, L., Kuzmanovic, A., Chen, Y.. Internet cache pollution attacks and countermeasures. In: Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP). 2006, p. 54 - 64.
    • [39] Shanbhag, S.. Design and implementation of parallel anomaly detection. 2007.
    • [40] Karami, A., Guerrero-Zapata, M.. Mining and visualizing uncertain data objects and named data networking tra cs by fuzzy self-organizing map. In: In Proceedings of the Second International Workshop on Artificial Intelligence and Cognition (AIC); vol. 1315. 2014, p. 156 - 163.
    • [41] Karami, A., Johansson, R.. Utilization of multi attribute decision making techniques to integrate automatic and manual ranking of options. Journal of Information Science and Engineering 2014;30(2):519 - 534.
    • [42] Jin, Y.. Multi-objective machine learning; vol. 16. Springer; 2006.
    • [43] Afanasyev, A., Moiseenko, I., Zhang, L.. ndnSIM: NDN simulator for NS-3. Technical Report NDN-0005; NDN; 2012. URL http://named-data.net/techreports.html.
    • [44] Heckmann, O., Piringer, M., Schmitt, J., Steinmetz, R.. On realistic network topologies for simulation. In: Proceedings of the ACM SIGCOMM Workshop on Models, Methods and Tools for Reproducible Network Research. MoMeTools '03; New York, NY, USA: ACM; 2003, p. 28 - 32.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article