Skip to main content
Log in

FuRL: fuzzy RBM learning framework to detect and mitigate network anomalies in Information Centric Network

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

Information Centric Network (ICN) is a promising next-generation internet architecture in which the network focuses on retrieving the content by employing open in-network caching scheme to provide an efficient content distribution to users. However, such open in-network caching is vulnerable to network anomalies. In particular, cache pollution attack disrupts the smooth working of in-network caching by flooding unpopular contents. Hence, the in-network caching malfunctions and legitimate consumer requests are dropped. To address this problem, a secure framework based on Fuzzy Restricted Boltzmann Machine has been proposed to detect the anomalies and defend against such pollution attacks in ICN. Further, a reward-based cache replacement (ReBac) algorithm that is capable of avoiding cache pollution attack has also been proposed. The experimental results obtained while testing the proposed framework show better detection rate compared with the state-of-art solution and the proposed framework shows better cache rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13

Similar content being viewed by others

References

  1. Wang G 2013 PID: a generic naming schema for information-centric network. Draft-zhang-icnrg-pid-naming-scheme-02

  2. Ahlgren B, Dannewitz C, Imbrenda C, Kutscher D and Ohlman B 2012 A survey of information-centric networking. IEEE Communications Magazine 50: 26–36

    Article  Google Scholar 

  3. Ming Z, Xu M and Wang D 2014 Age-based cooperative caching in information-centric networking. In: Proceedings of the 23rd IEEE International Conference on Computer Communication and Networks (ICCCN), pp. 1–8

  4. Li H, Zhou H, Quan W, Feng B, Zhang H and Yu S 2017 HCaching: high-speed caching for information-centric networking. In: 2017-2017 Proceedings of the IEEE Global Communications Conference, GLOBECOM, pp. 1–6

  5. Naeem M, Ali R, Kim BS, Nor S and Hassan S 2018 A periodic caching strategy solution for the smart city in information-centric. Internet of Things. Sustainability 10(7): 2576

    Google Scholar 

  6. Hu Q, Li C, Hasan T, Li C and Jiang Q 2018 A collaborative caching strategy in content-centric networking. In: Proceedings of the EDP Sciences MATEC Web of Conferences, vol. 189, p. 03018

  7. Zhu X, Wang J, Wang L and Qi W 2017 Popularity-based neighborhood collaborative caching for information-centric networks. In: Proceedings of the 36th IEEE International Performance Computing and Communications Conference (IPCCC), pp. 1–8

  8. Abani N, Farhadi G, Ito A and Gerla M 2016 Popularity-based partial caching for Information Centric Networks. In: Proceedings of the Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), IEEE, pp. 1–8

  9. Zhang G, Liu J, Chang X and Chen Z 2017 Combining popularity and locality to enhance in-network caching performance and mitigate pollution attacks in content-centric networking. IEEE Access 5: 19012–19022

    Article  Google Scholar 

  10. Deng L, Gao Y, Chen Y and Kuzmanovic A 2008 Pollution attacks and defenses for internet caching systems. Computer Networks 52(5): 935–956

    Article  Google Scholar 

  11. Muscariello L, Carofiglio G and Gallo M 2011 Bandwidth and storage sharing performance in information centric networking. In: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, ACM, pp. 26–31

  12. Xu Z, Chen B, Wang N, Zhang Y and Li Z 2015 ELDA: towards efficient and lightweight detection of cache pollution attacks in NDN. In: Proceedings of the 40th IEEE Conference on Local Computer Networks (LCN), pp. 82–90

  13. Gao Y, Deng L, Kuzmanovic A and Chen Y 2006 Internet cache pollution attacks and countermeasures. In: Proceedings of the 14th IEEE International Conference on Network Protocols, ICNP’06, pp. 54–64

  14. Salah H, Alfatafta M, SayedAhmed S and Strufe T 2017 CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively. In: Proceedings of the 42nd IEEE Conference on Local Computer Networks, LCN)

  15. Park H, Widjaja I and Lee H 2012, June Detection of cache pollution attacks using randomness checks. In: Proceedings of the IEEE International Conference on Communications (ICC), pp. 1096–1100

  16. Conti M, Gasti P and Teoli M 2013 A lightweight mechanism for detection of cache pollution attacks in named data networking. Computer Networks 57(16): 3178–3191

    Article  Google Scholar 

  17. Li Q, Zhang X, Zheng Q, Sandhu R and Fu X 2015 LIVE: lightweight integrity verification and content access control for named data networking. IEEE Transactions on Information Forensics and Security 10(2): 308–320

    Article  Google Scholar 

  18. Karami A and Guerrero-Zapata M 2015 An ANFIS-based cache replacement method for mitigating cache pollution attacks in named data networking. Computer Networks 80: 51–65

    Article  Google Scholar 

  19. Xie M, Widjaja I and Wang H 2012 Enhancing cache robustness for content-centric networking. In: Proceedings of INFOCOM, IEEE, pp. 2426–2434

  20. Bilal M and Kang SG 2017 A cache management scheme for efficient content eviction and replication in cache networks. IEEE Access 5: 1692–1701

    Article  Google Scholar 

  21. Ran J, Lv N, Zhang D, Ma Y and Xie Z 2013, July On performance of cache policies in named data networking. In: Proceedings of the International Conference on Advanced Computer Science and Electronics Information, pp. 668–671

  22. Hayamizu Y, Shibuya A and Yamamoto M 2017 Effective new cache decision policy for breadcrumbs in content-centric networking. In: Proceedings of the IEEE International Workshop of the Technical Committee on Communications Quality and Reliability (CQR), pp. 1–6

  23. Lal KN and Kumar A 2016 A cache content replacement scheme for information centric network. Procedia Computer Science 89: 73–81

    Article  Google Scholar 

  24. Chen X, Fan Q and Yin H 2013 Caching in information-centric networking: from a content delivery path perspective. In: Proceedings of the 9th International Conference on Innovations in Information Technology (IIT), IEEE, pp. 48–53

  25. Kamimoto T, Mori K, Umeda S, Ohata Y and Shigeno H Cache protection method based on prefix hierarchy for content-oriented network. In: Proceedings of the 13th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 417–422

  26. Yao L, Fan Z, Deng J, Fan X and Wu G 2018 Detection and defense of cache pollution attacks using clustering in named data networks. IEEE Transactions on Dependable and Secure Computinghttps://doi.org/10.1109/TDSC.2018.2876257

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P Vimala Rani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rani, P.V., Shalinie, S.M. FuRL: fuzzy RBM learning framework to detect and mitigate network anomalies in Information Centric Network. Sādhanā 45, 100 (2020). https://doi.org/10.1007/s12046-020-01331-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-020-01331-3

Keywords

Navigation