LSTM-Based Detection for Timing Attacks in Named Data Network

Named Data Network (NDN) is an alternative to host-centric networking exemplified by today's Internet. One key feature of NDN is in-network caching that reduces access delay and query overhead by caching popular contents at the source as well as at a few other nodes. Unfortunately, in-network caching suffers various privacy risks by different attacks, one of which is termed timing attack. This is an attack to infer whether a consumer has recently requested certain contents based on the time difference between the delivery time of those contents that are currently cached and those that are not cached. In order to prevent the privacy leakage and resist such kind of attacks, we propose a detection scheme by adopting Long Short-term Memory (LSTM) model. Based on the four input features of LSTM, cache hit ratio, average request interval, request frequency, and types of requested contents, we timely capture more important eigenvalues by dividing a constant time window size into a few small slices in order to detect timing attacks accurately. We have performed extensive simulations to compare our scheme with several other state-of-the-art schemes in classification accuracy, detection ratio, false alarm ratio, and F-measure. It has been shown that our scheme possesses a better performance in all cases studied.

[1]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[2]  Andrew W. Senior,et al.  Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition , 2014, ArXiv.

[3]  Retantyo Wardoyo,et al.  Time Complexity Analysis of Support Vector Machines (SVM) in LibSVM , 2015 .

[4]  Ertugrul Dogruluk,et al.  Identifying Previously Requested Content by Side-Channel Timing Attack in NDN , 2018, FNSS.

[5]  Ertugrul Dogruluk,et al.  Evaluating privacy attacks in Named Data Network , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[6]  Naveen Kumar,et al.  A Triggered Delay-based Approach against Cache Privacy Attack in NDN , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).

[7]  Satyajayant Misra,et al.  Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[8]  Mario Gerla,et al.  Centrality-based caching for privacy in Information-Centric Networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[9]  Donald F. Towsley,et al.  Approximate Models for General Cache Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[10]  Aziz Mohaisen,et al.  Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures , 2015, IEEE Transactions on Dependable and Secure Computing.

[11]  Thomas Engel,et al.  Security Monitoring for Content-Centric Networking , 2012, DPM/SETOP.

[12]  Mauro Conti,et al.  Cache Privacy in Named-Data Networking , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[13]  Hani Salah,et al.  CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively , 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN).

[14]  Neeraj Suri,et al.  Named Data Networking: A survey , 2016, Comput. Sci. Rev..

[15]  Anand Seetharam On Caching and Routing in Information-Centric Networks , 2018, IEEE Communications Magazine.

[16]  Lin Yao,et al.  Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks , 2020, IEEE Transactions on Dependable and Secure Computing.

[17]  Sunyoung Han,et al.  Detecting router cache snooping in Named Data Networking , 2012, 2012 International Conference on ICT Convergence (ICTC).