Na Fan , Yuxin Gao , Jialong Li , Zhiquan Liu , Wenjun Fan
{"title":"Multi-Attack Identification and Mitigation mechanism based on multi-agent collaboration in Vehicular Named Data Networking","authors":"Na Fan , Yuxin Gao , Jialong Li , Zhiquan Liu , Wenjun Fan","doi":"10.1016/j.comnet.2025.111226","DOIUrl":null,"url":null,"abstract":"<div><div>This paper introduces a novel Multi-Attack Identification and Mitigation mechanism (MAIM) designed to enhance security within Vehicular Name Data Networking (VNDN), a derivative of Name Data Networking (NDN) optimized for the Internet of Vehicles (IoV). VNDN, while offering improved communication security for mobile networks, is vulnerable to interest flooding attacks. MAIM addresses this issue through a collaborative multi-agent system comprising detection algorithms, an identification model, and a mitigation model. The MAIM mechanism begins with vehicle nodes monitoring traffic and identifying potential threats, relaying this information to Road Side Units (RSUs), which utilize Random Forests to detect attacks. Detected threats are then communicated to the Base Station (BS), which employs Convolutional Neural Networks and Support Vector Machines to analyze and classify the attack type. The RSUs, informed by the BS, use Graph Convolution Networks to isolate malicious nodes, effectively mitigating the attack. Comparative simulation and real-world experiments demonstrate MAIM’s superior performance in attack recognition and mitigation, the average accuracy for attack detection is 97.5%, the average accuracy for attack identification reaches 85.2%, while the average interest satisfaction rate under attack suppression stands at 81%, highlighting its potential as a robust solution for securing VNDN environments.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111226"},"PeriodicalIF":4.4000,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S138912862500194X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
This paper introduces a novel Multi-Attack Identification and Mitigation mechanism (MAIM) designed to enhance security within Vehicular Name Data Networking (VNDN), a derivative of Name Data Networking (NDN) optimized for the Internet of Vehicles (IoV). VNDN, while offering improved communication security for mobile networks, is vulnerable to interest flooding attacks. MAIM addresses this issue through a collaborative multi-agent system comprising detection algorithms, an identification model, and a mitigation model. The MAIM mechanism begins with vehicle nodes monitoring traffic and identifying potential threats, relaying this information to Road Side Units (RSUs), which utilize Random Forests to detect attacks. Detected threats are then communicated to the Base Station (BS), which employs Convolutional Neural Networks and Support Vector Machines to analyze and classify the attack type. The RSUs, informed by the BS, use Graph Convolution Networks to isolate malicious nodes, effectively mitigating the attack. Comparative simulation and real-world experiments demonstrate MAIM’s superior performance in attack recognition and mitigation, the average accuracy for attack detection is 97.5%, the average accuracy for attack identification reaches 85.2%, while the average interest satisfaction rate under attack suppression stands at 81%, highlighting its potential as a robust solution for securing VNDN environments.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.