2020
DOI: 10.1109/jsyst.2019.2939371
|View full text |Cite
|
Sign up to set email alerts
|

Resist Interest Flooding Attacks via Entropy–SVM and Jensen–Shannon Divergence in Information-Centric Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…Xin et al [109], Shigeyasu et al [78], DPE [105], TDM [104], Vassilakis et al [98], Tang et al [95], Shinohara et al [90], Wang et al [106], Benmoussa et al [24], Karami et al [49], Zhi et al [128], Ding et al [38], Zhi et al [130], Hou et al [46], ChoKIFA [22],…”
Section: Statefull Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Xin et al [109], Shigeyasu et al [78], DPE [105], TDM [104], Vassilakis et al [98], Tang et al [95], Shinohara et al [90], Wang et al [106], Benmoussa et al [24], Karami et al [49], Zhi et al [128], Ding et al [38], Zhi et al [130], Hou et al [46], ChoKIFA [22],…”
Section: Statefull Solutionsmentioning
confidence: 99%
“…However, the rate-limiting can affect legitimate consumers. Another machine learning-based detection mechanism was proposed in [128]. In this solution, a router constantly collects the entropy of Interest names, the satisfaction ratio, and the PIT usage of interfaces before using them as entries for the support vector machine (SVM) classifier.…”
Section: Proactive Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…chip-scale optical circuit type) silicon probes for sub-millisecond deep-brain optical stimulation -e.g. for the purpose of gaining a deeper understanding of the neural code, in Perera et al [290] for the quantification of the level of rationality in supply chain networks, in Pierri et al [294] for the study of growth of malicious/misleading information in some social media diffusion networks, in Rabadan et al [299] for the identification of gene mutations that lead to the genesis and progression of tumors, in Reiter et al [306] for quantifying metastatic phylogenetic diversity, in Van de Sande et al [378] as part of a computational toolbox for single-cell gene regulatory network analysis, in Skinnider et al [337] for the prediction of the chemical structures of genomically encoded antibiotics -in order to find means against the looming global crisis of antibiotic resistance, in Tuo et al [367] for the detection of high-order single nucleotide polymorphism (SNP) interactions, in Uttam et al [370] for predicting the risk of colorectal cancer recurrence and inferring associated tumor microenvironment networks, in Zhang et al [421] for incipient fault (namely, crack) detection, in Zhi et al [425] for the strengthening of information-centric networks against interest flooding attack (IFAs), in Acera Mateos et al [3] for deep-learning classification of SARS-CoV-2 and co-infecting RNA viruses, in Avsec et al [24] for uncovering the motifs and syntax of cis-regulatory sequences in genomics data, in Barennes et al [32] for comparing the accuracy of current T cell receptor sequencing methods employed for the understanding of adaptive immune responses, in Chen et al [79] for clustering high-dimensional microbial data from RNA sequencing, in Chen et al [84] for investigating key aspects of effective vocal social communication, in Koldobskiy et al [193] for investigations of genetic and epigenetic drivers of paediatric acute lymphoblastic leukaemia, in McGinnis et al [258] for evaluating RNA sequencing of pooled blood cell samples, in Mühlroth & Grottke [268] for the detection of emerging trends and technologies through artificial intelligence techniques, in Necci et al [272] for the assessment of protein intrinsic disorder predictions, in Okada et al [277] for the identification of genetic factors that cause individual differences in whole lymphocyte profiles and their changes after vaccination, and in Zhang et al [422] for the learning of functional magnetic resonance imaging (fMRI) time-seri...…”
Section: We Obtainmentioning
confidence: 99%
“…The motivation behind this research work is to mitigate the IFA that leads packet broadcast storm of uncontrolled and unsolicited traffic across VNDN. Various IFA mitigation schemes have been proposed for NDN scenario, that is, per-face Interest rate monitoring techniques [13][14][15][16], statistical modelling-based approaches [17][18][19], adaptive in-network caching [20][21][22][23][24][25] and packet routing algorithms [26][27][28][29][30][31][32]. However, the drawback of these schemes is that along with malicious Interest packets, a high volume of legitimate Interest packets is dropped as well.…”
Section: Introductionmentioning
confidence: 99%