XGBoost-Based Detection of DDoS Attacks in Named Data Networking
Abstract
:1. Introduction
- The limitations of the I-CIFPA model are analyzed, and an improved XGBoost-based detection algorithm is proposed, incorporating optimized feature selection and hyperparameter tuning to enhance IFA attack detection accuracy in NDN.
- An in-depth analysis of the impact of I-CIFPA on NDN stability and resource allocation is conducted by investigating key network performance indicators, including CacheHits, TimeOutInterests, and OutInterests.
- The attack data are tested and analyzed for both single-feature and multi-feature scenarios, and the proposed algorithm is evaluated against other algorithms based on the AUC score.
2. Related Work
3. The Attack Model and Detection Method
3.1. The Attack Model of I-CIFPA
3.2. The Detection Mechanism of Improved XGBoost
4. Experiment Analysis
4.1. Simulation Environment
4.2. Performance Analysis of I-CIFPA
4.3. Analysis of Experiment Result
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zhang, Z.; Yu, Y.; Zhang, H.; Newberry, E.; Mastorakis, S.; Li, Y.; Afanasyev, A.; Zhang, L. An Overview of Security Support in Named Data Networking. IEEE Commun. Mag. 2018, 56, 62–68. [Google Scholar] [CrossRef]
- Gasti, P.; Tsudik, G.; Uzun, E.; Zhang, L. DoS and DDoS in Named-Data Networking. In Proceedings of the 2013 22nd International Conference on Computer Communication and Networks (ICCCN), Nassau, Bahamas, 30 July–2 August 2013; pp. 1–7. [Google Scholar]
- Afanasyev, A.; Mahadevan, P.; Moiseenko, I.; Uzun, E.; Zhang, L. Interest flooding attack and countermeasures in Named Data Networking. In Proceedings of the 2013 IFIP Networking Conference, Brooklyn, NY, USA, 22–24 May 2013; pp. 1–9. [Google Scholar]
- Khaderani, H.A.; Muhammadi, I.; Muhammad, L.R.; Sucipto, A.; Kusumastuti, L.R.; Nurhayati, A.; Ahdan, S.; Syambas, N.R. Effect of Interest Variation and Prefix Length on Pending Interest Table (PIT) Performance in Named Data Networking (NDN). In Proceedings of the 2023 9th International Conference on Wireless and Telematics (ICWT), Solo, Indonesia, 6–7 July 2023; pp. 1–5. [Google Scholar]
- Conti, M.; Gasti, P.; Teoli, M. A lightweight mechanism for detection of cache pollution attacks in Named Data Networking. Comput. Netw. 2013, 57, 3178–3191. [Google Scholar] [CrossRef]
- Xin, Y.; Li, Y.; Wang, W.; Li, W.; Chen, X. A Novel Interest Flooding Attacks Detection and Countermeasure Scheme in NDN. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–7. [Google Scholar]
- Mulyana, E.; Syambas, N.R. The Impact of Interest Flooding Attack (IFA) and Collusive IFA on Named Data Networking (NDN). In Proceedings of the 2023 6th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Batam, Indonesia, 11 December 2023; pp. 207–212. [Google Scholar]
- Liu, L.; Peng, S. Detection of A Novel Dual Attack in Named Data Networking. In Proceedings of the 2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), Melbourne, Australia, 17–19 December 2022; pp. 1–8. [Google Scholar]
- Compagno, A.; Conti, M.; Gasti, P.; Tsudik, G. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. In Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, NSW, Australia, 21–24 October 2013; pp. 630–638. [Google Scholar]
- Xing, G.; Chen, J.; Hou, R.; Zhou, L.; Dong, M.; Zeng, D.; Luo, J.; Ma, M. Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking. IEEE Commun. Mag. 2021, 59, 98–103. [Google Scholar] [CrossRef]
- Carletti, M.; Terzi, M.; Susto, G.A. Interpretable Anomaly Detection with DIFFI: Depth-based feature importance of Isolation Forest. Eng. Appl. Artif. Intell. 2023, 119, 105730. [Google Scholar] [CrossRef]
- Benmoussa, A.; Tahari, A.e.K.; Kerrache, C.A.; Lagraa, N.; Lakas, A.; Hussain, R.; Ahmad, F. MSIDN: Mitigation of Sophisticated Interest flooding-based DDoS attacks in Named Data Networking. Future Gener. Comput. Syst. 2020, 107, 293–306. [Google Scholar] [CrossRef]
- Salah, H.; Strufe, T. Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, 27–30 June 2016; pp. 938–945. [Google Scholar]
- Zhou, J.; Luo, J.; Deng, L.; Wang, J. Defense Mechanism of Interest Flooding Attack Based on Deep Reinforcement Learning. In Proceedings of the 2020 3rd International Conference on Hot Information-Centric Networking (HotICN), Hefei, China, 12–14 December 2020; pp. 65–70. [Google Scholar]
- Hidouri, A.; Hajlaoui, N.; Touati, H.; Hadded, M.; Muhlethaler, P. A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking. Computers 2022, 11, 186. [Google Scholar] [CrossRef]
- Deng, J.; Cheng, L.; Yuan, H.; Zheng, K.; Li, X.; Li, Q. An Online Detection System for LDoS attack Based on XGBoost. In Proceedings of the 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), Wuhan, China, 21–24 December 2023; pp. 1083–1088. [Google Scholar]
- Chen, Z.; Jiang, F.; Cheng, Y.; Gu, X.; Liu, W.; Peng, J. XGBoost Classifier for DDoS Attack Detection and Analysis in SDN-Based Cloud. In Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), Shanghai, China, 15–17 January 2018; pp. 251–256. [Google Scholar]
- Ma, Z.; Kaban, A. K-Nearest-Neighbours with a novel similaritymeasure for intrusion detection. In Proceedings of the IEEE 13th UK Workshop on Computational Intelligence (UKCI), Guildford, UK, 9–11 September 2013; pp. 266–271. [Google Scholar]
- Hu, W.; Maybank, S. AdaBoost-Based Algorithm for Network Intrusion Detection. IEEE Trans. Syst. Man Cybern. Part Cybern. 2008, 38, 577–583. [Google Scholar]
- He, H.; Garcia, E.A. Learning from Imbalanced Data. IEEE Trans. Knowl. Data Eng. 2009, 21, 1263–1284. [Google Scholar]
Adjusted Parameter | Interval | Value |
---|---|---|
max_depth | [1, 10] | 7 |
n_estimator | [1, 500] | 200 |
eta | [0.01, 0.5] | 0.1 |
gamma | [0.001, 10] | 0.01 |
subsample | [0.01, 1] | 0.8 |
min_child_weight | [0, 20] | 10 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, L.; Yu, W.; Wu, Z.; Peng, S. XGBoost-Based Detection of DDoS Attacks in Named Data Networking. Future Internet 2025, 17, 206. https://doi.org/10.3390/fi17050206
Liu L, Yu W, Wu Z, Peng S. XGBoost-Based Detection of DDoS Attacks in Named Data Networking. Future Internet. 2025; 17(5):206. https://doi.org/10.3390/fi17050206
Chicago/Turabian StyleLiu, Liang, Weiqing Yu, Zhijun Wu, and Silin Peng. 2025. "XGBoost-Based Detection of DDoS Attacks in Named Data Networking" Future Internet 17, no. 5: 206. https://doi.org/10.3390/fi17050206
APA StyleLiu, L., Yu, W., Wu, Z., & Peng, S. (2025). XGBoost-Based Detection of DDoS Attacks in Named Data Networking. Future Internet, 17(5), 206. https://doi.org/10.3390/fi17050206