2023
DOI: 10.1007/978-981-19-9697-9_49
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Defense Schemes for Cache Pollution Attack in Content-Centric Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Artificial Intelligence and Machine Learning (AI/ML) can be applied to detect anomalies in network traffic and identify suspicious content behavior in distributed ICN. The authors of [64] proposed an attack detection and mitigation mechanism based on user and network behaviors using a trained support vector machine. This scheme can efficiently detect false-locality attacks on content and probabilistically discard them to prevent cache pollution.…”
Section: Availability and Accessibilitymentioning
confidence: 99%
“…Artificial Intelligence and Machine Learning (AI/ML) can be applied to detect anomalies in network traffic and identify suspicious content behavior in distributed ICN. The authors of [64] proposed an attack detection and mitigation mechanism based on user and network behaviors using a trained support vector machine. This scheme can efficiently detect false-locality attacks on content and probabilistically discard them to prevent cache pollution.…”
Section: Availability and Accessibilitymentioning
confidence: 99%
“…Yang et al (40) recently proposed a novel CPA mitigation mechanism based on Support Vector Machine (SVM). This approach utilizes various parameters to detect the occurrence of CPA attacks, including the number of interests received per second, the number of content requesters, the distribution of requesters, the core network traffic, and the Cache Hit Ratio of legitimate users.…”
Section: Related Workmentioning
confidence: 99%