A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

被引:111
|
作者
Conti, Mauro [1 ]
Gasti, Paolo [2 ]
Teoli, Marco [1 ]
机构
[1] Univ Padua, Dept Math, I-35131 Padua, Italy
[2] New York Inst Technol, Sch Engn & Comp Sci, New York, NY 10023 USA
基金
美国国家科学基金会;
关键词
Named data networking; Cache pollution attack; Security;
D O I
10.1016/j.comnet.2013.07.034
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Content-Centric Networking (CCN) is an emerging paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content - rather than addressable hosts - becomes a first-class entity. Content is therefore decoupled from its location. This allows, among other things, the implementation of ubiquitous caching. Named-Data Networking (NON) is a prominent example of CCN. In NON, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. This makes NDN a good architecture for efficient large scale content distribution. However, reliance on caching allows an adversary to perform attacks that are very effective and relatively easy to implement. Such attacks include cache poisoning (i.e., introducing malicious content into caches) and cache pollution (i.e., disrupting cache locality). This paper focuses on cache pollution attacks, where the adversary's goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers. We show, via simulations, that such attacks can be implemented in NON using limited resources, and that their effectiveness is not limited to small topologies. We then illustrate that existing proactive countermeasures are ineffective against realistic adversaries. Finally, we introduce a new technique for detecting pollution attacks. Our technique detects high and low rate attacks on different topologies with high accuracy. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:3178 / 3191
页数:14
相关论文
共 50 条
  • [21] A Partial Cache for Multimedia Content in Named Data Networking
    Hsu, Jenq-Muh
    Chiu, Hsiao-Yi
    Ye, Yi-Shivan
    2015 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2015, : 37 - 38
  • [22] A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking
    Zhu, Yi
    Kang, Haohao
    Huang, Ruhui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (12): : 6123 - 6138
  • [23] Detection of Interest Flooding Attacks in Named Data Networking using Hypothesis Testing
    Nguyen, Tan N.
    Cogranne, Remi
    Doyen, Guillaume
    Retraint, Florent
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [24] A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures
    Dogruluk, Ertugrul
    Macedo, Joaquim
    Costa, Antonio
    ELECTRONICS, 2022, 11 (08)
  • [25] Assuaging cache based attacks in Named Data Network
    Adithya, S.
    Karthik, Gowtham G.
    Hariharan, H.
    Vetriselvi, V.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 872 - 876
  • [26] Security and Integrity Attacks in Named Data Networking: A Survey
    Shah, Mohammad Shahrul Mohd
    Leau, Yu-Beng
    Anbar, Mohammed
    Bin-Salem, Ali Abdulqader
    IEEE ACCESS, 2023, 11 : 7984 - 8004
  • [27] SLP: A Secure and Lightweight Scheme Against Content Poisoning Attacks in Named Data Networking Based on Probing
    Ding, Kunpeng
    Yang, Jiayu
    Xue, Kaiping
    Han, Jiangping
    Li, Jian
    Sun, Qibin
    Lu, Jun
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (06) : 5128 - 5143
  • [28] Proactive Cache Placement and Optimal Partitioning in Named Data Networking
    Pakle, Ganesh
    Manthalkar, Ramchandra
    EMERGING TECHNOLOGIES IN COMPUTER ENGINEERING: MICROSERVICES IN BIG DATA ANALYTICS, 2019, 985 : 322 - 335
  • [29] Cache and Delivery of VR Video over Named Data Networking
    Zhang, Yi
    Jiang, Xiaoke
    Wang, Yi
    Lei, Kai
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 280 - 285
  • [30] Cache sharing using bloom filters in named data networking
    Mun, Ju Hyoung
    Lim, Hyesook
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 90 : 74 - 82