{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:11:05Z","timestamp":1767917465085,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03350-x","type":"journal-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T12:03:39Z","timestamp":1730462619000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CBIDM: Controller Based Intelligent Detection and Mitigation Approach for Interest Flooding Attack in Named Data Networking"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0882-3119","authenticated-orcid":false,"given":"Naveen","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6676-9072","authenticated-orcid":false,"given":"Abdul","family":"Aleem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"key":"3350_CR1","unstructured":"Peng G. CDN: Content distribution network. arXiv preprint arXiv:cs\/0411069; 2004."},{"key":"3350_CR2","doi-asserted-by":"crossref","unstructured":"Ghodsi A, Shenker S, Koponen T, Singla A, Raghavan B, Wilcox J. Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM workshop on hot topics in networks; 2011. p. 1\u20136","DOI":"10.1145\/2070562.2070563"},{"key":"3350_CR3","doi-asserted-by":"crossref","unstructured":"Koponen T, Chawla M, Chun B-G, Ermolinskiy A, Kim KH, Shenker S, Stoica I. A data-oriented (and beyond) network architecture. In: Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for computer communications; 2007. p. 181\u2013192","DOI":"10.1145\/1282380.1282402"},{"key":"3350_CR4","unstructured":"Garc\u00eda G, Beben A, Ram\u00f3n FJ, Maeso A, Psaras I, Pavlou G, Wang N, \u015aliwi\u0144ski J, Spirou S, Soursos S, et al. Comet: Content mediator architecture for content-aware networks. In: 2011 Future Network & Mobile Summit. IEEE; 2011. p. 1\u20138."},{"key":"3350_CR5","unstructured":"Jacobson V, Mosko M, Smetters D, Garcia-Luna-Aceves J. Content-centric networking. Whitepaper, Palo Alto Research Center; 2007. p. 2\u20134."},{"key":"3350_CR6","unstructured":"Zhang L, Estrin D, Burke J, Jacobson V, Thornton JD, Smetters DK, Zhang B, Tsudik G, Massey D, Papadopoulos C, et al. Named data networking (NDN) project. Relat\u00f3rio T\u00e9cnico NDN-0001, Xerox Palo Alto Research Center-PARC; 2010. p. 157\u2013158."},{"key":"3350_CR7","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1007\/s11390-019-1978-9","volume":"34","author":"N Kumar","year":"2019","unstructured":"Kumar N, Singh AK, Aleem A, Srivastava S. Security attacks in named data networking: a review and research directions. J Comput Sci Technol. 2019;34:1319\u201350.","journal-title":"J. Comput. Sci. Technol."},{"issue":"5","key":"3350_CR8","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1007\/s10586-022-03598-z","volume":"25","author":"S Ahmad","year":"2022","unstructured":"Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J. RSM analysis based cloud access security broker: a systematic literature review. Clust Comput. 2022;25(5):3733\u201363.","journal-title":"Clust Comput."},{"key":"3350_CR9","doi-asserted-by":"crossref","unstructured":"Gasti P, Tsudik G, Uzun E, Zhang L. Dos and ddos in named data networking. In: 2013 22nd International Conference on Computer Communication and Networks (ICCCN). IEEE; 2013. p. 1\u20137.","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"3350_CR10","unstructured":"Afanasyev A, Mahadevan P, Moiseenko I, Uzun E, Zhang L. Interest flooding attack and countermeasures in named data networking. In: 2013 IFIP Networking Conference. IEEE; 2013. p. 1\u20139."},{"key":"3350_CR11","doi-asserted-by":"crossref","unstructured":"Dai H, Wang Y, Fan J, Liu B. Mitigate DDoS attacks in NDN by interest traceback. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE; 2013. p. 381\u2013386.","DOI":"10.1109\/INFCOMW.2013.6970722"},{"key":"3350_CR12","doi-asserted-by":"crossref","unstructured":"Compagno A, Conti M, Gasti P, Tsudik G. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In: 38th annual IEEE conference on local computer networks. IEEE; 2013. p. 630\u2013638","DOI":"10.1109\/LCN.2013.6761300"},{"key":"3350_CR13","doi-asserted-by":"crossref","unstructured":"Wang K, Zhou H, Qin Y, Chen J, Zhang H, Decoupling malicious interests from pending interest table to mitigate interest flooding attacks. In: 2013 IEEE Globecom Workshops (GC Wkshps). IEEE; 2013. p. 963\u20138.","DOI":"10.1109\/GLOCOMW.2013.6825115"},{"key":"3350_CR14","doi-asserted-by":"crossref","unstructured":"Xin Y, Li Y, Wang W, Li W, Chen X. Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM). IEEE; 2017. p. 557\u2013562.","DOI":"10.1109\/MILCOM.2017.8170763"},{"key":"3350_CR15","doi-asserted-by":"crossref","unstructured":"Kumar N, Singh AK, Srivastava S. Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. In: Proceedings of the 10th International Conference on Security of Information and Networks; 2017. p. 299\u2013302.","DOI":"10.1145\/3136825.3136864"},{"issue":"6","key":"3350_CR16","first-page":"537","volume":"43","author":"N Kumar","year":"2021","unstructured":"Kumar N, Singh AK, Srivastava S. Feature selection for interest flooding attack in named data networking. Int J Comput Appl. 2021;43(6):537\u201346.","journal-title":"Int J Comput Appl."},{"key":"3350_CR17","unstructured":"Afanasyev A, Moiseenko I, Zhang L, et al. ndnsim: NDN simulator for ns-3. Technical Report, vol. 4. Los Angeles: University of California; 2012. p. 1\u20137."},{"key":"3350_CR18","unstructured":"Team, N.: NDN Packet format specification. Named Data Networking; 2023. https:\/\/docs.named-data.net\/NDN-packet-spec\/current\/"},{"key":"3350_CR19","doi-asserted-by":"crossref","unstructured":"Benarfa A, Hassan M, Compagno A, Losiouk E, Yagoubi MB, Conti M. Chokifa: a new detection and mitigation approach against interest flooding attacks in NDN. In: Wired\/Wireless Internet Communications: 17th IFIP WG 6.2 International Conference, WWIC 2019, Bologna, Italy, June 17\u201318, 2019, Proceedings 17. Springer; 2019. p. 53\u201365.","DOI":"10.1007\/978-3-030-30523-9_5"},{"key":"3350_CR20","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10207-020-00500-z","volume":"20","author":"A Benarfa","year":"2021","unstructured":"Benarfa A, Hassan M, Losiouk E, Compagno A, Yagoubi MB, Conti M. Chokifa+: an early detection and mitigation approach against interest flooding attacks in NDN. Int J Inf Secur. 2021;20:269\u201385.","journal-title":"Int J Inf Secur."},{"key":"3350_CR21","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.future.2020.01.043","volume":"107","author":"A Benmoussa","year":"2020","unstructured":"Benmoussa A, Karim Tahari A, Kerrache CA, Lagraa N, Lakas A, Hussain R, Ahmad F. MSIDN: mitigation of sophisticated interest flooding-based DDoS attacks in named data networking. Future Gener Comput Syst. 2020;107:293\u2013306.","journal-title":"Future Gener Comput Syst."},{"issue":"1","key":"3350_CR22","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TNSE.2022.3206581","volume":"10","author":"Z Wu","year":"2022","unstructured":"Wu Z, Peng S, Liu L, Yue M. Detection of improved collusive interest flooding attacks using BO-GBM fusion algorithm in NDN. IEEE Trans Netw Sci Eng. 2022;10(1):239\u201352.","journal-title":"IEEE Trans Netw Sci Eng."},{"key":"3350_CR23","doi-asserted-by":"crossref","unstructured":"Zhang Y, Guo X-X, Ma M. Admbifa: Accurate detection and mitigation of blended interest flooding attacks in NDNS. In: 2023 IEEE 24th International Conference on High Performance Switching and Routing (HPSR). IEEE; 2023. p. 56\u201361","DOI":"10.1109\/HPSR57248.2023.10147974"},{"key":"3350_CR24","doi-asserted-by":"crossref","unstructured":"Xiao P, Qu W, Qi H, Li Z, Xu Y. The SDN controller placement problem for WAN. In: 2014 IEEE\/CIC International Conference on Communications in China (ICCC). IEEE; 2014. p. 220\u2013224.","DOI":"10.1109\/ICCChina.2014.7008275"},{"key":"3350_CR25","doi-asserted-by":"crossref","unstructured":"Riley GF, Henderson TR. The ns-3 network simulator. In: Modeling and tools for network simulation. Berlin: Springer; 2010. p. 15\u201334.","DOI":"10.1007\/978-3-642-12331-3_2"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03350-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03350-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03350-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T12:06:52Z","timestamp":1730462812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03350-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"references-count":25,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["3350"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03350-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"6 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1008"}}