Research Article

Attention-Based LSTM Model for IFA Detection in Named Data Networking

Algorithm 3

Hellinger distance-based malicious prefix recognition.
Input:
Interest prefix distribution when IFA is detected:
Interest prefix distribution before IFA is detected:
Interest prefix set:
Output:
Malicious prefix set
(1)
(2)fordo
(3)
(4)calculate the Hellinger distance
(5)ifthen
(6)add to malicious prefix set
(7)end if
(8)end for
(9)return malicious prefix set