Open AccessOpen Access


Research on Detection Method of Interest Flooding Attack in Named Data Networking

Yabin Xu1,2,*, Peiyuan Gu2, Xiaowei Xu3

1 Beijing Key Laboratory of Internet Culture and Digital Dissemination Research, Beijing, 100101, China
2 Computer School, Beijing Information Science and Technology University, Beijing, 100101, China
3 Department of Information Science, University of Arkansas at Little Rock, Little Rock, 72204, USA

* Corresponding Author: Yabin Xu. Email:

Intelligent Automation & Soft Computing 2021, 30(1), 113-127.


In order to effectively detect interest flooding attack (IFA) in Named Data Networking (NDN), this paper proposes a detection method of interest flooding attack based on chi-square test and similarity test. Firstly, it determines the detection window size based on the distribution of information name prefixes (that is information entropy) in the current network traffic. The attackers may append arbitrary random suffix to a certain prefix in the network traffic, and then send a large number of interest packets that cannot get the response. Targeted at this problem, the sensitivity of chi-square test is used to detect the change of prefix of interest packets. Interest packets initiated by IFA attackers are usually attached to a real prefix, but with a randomly generated suffix attached. Taking into account of this problem, the similarity of interest packet prefixes is further detected. Finally, the detection results of the two aspects are combined to determine whether interest flooding attack has occurred or not. In addition, according to the symmetric routing characteristic of Pending Interest Table (PIT), we also send the forged interest packet back to the attacker, and then restrict the corresponding port of the attacker, so as to effectively suppress the IFA attack. The experimental results show that the method we proposed can not only detect IFA in NDN at the beginning of the attack, but also is more accurate and effective than other methods.


Cite This Article

Y. Xu, P. Gu and X. Xu, "Research on detection method of interest flooding attack in named data networking," Intelligent Automation & Soft Computing, vol. 30, no.1, pp. 113–127, 2021.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 989


  • 543


  • 0


Share Link

WeChat scan