Research Article

Attention-Based LSTM Model for IFA Detection in Named Data Networking

Table 3

Simulation parameters.

ParametersValue

Legitimate request distributionZipf-Mandelbrot
Malicious request distributionUniform
Number of content types1000
Malicious request rate100
Legitimate request rate100
Lifetime of PIT entries (second)1
Attack time (second)400
Simulation time800