A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

被引:111
|
作者
Conti, Mauro [1 ]
Gasti, Paolo [2 ]
Teoli, Marco [1 ]
机构
[1] Univ Padua, Dept Math, I-35131 Padua, Italy
[2] New York Inst Technol, Sch Engn & Comp Sci, New York, NY 10023 USA
基金
美国国家科学基金会;
关键词
Named data networking; Cache pollution attack; Security;
D O I
10.1016/j.comnet.2013.07.034
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Content-Centric Networking (CCN) is an emerging paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content - rather than addressable hosts - becomes a first-class entity. Content is therefore decoupled from its location. This allows, among other things, the implementation of ubiquitous caching. Named-Data Networking (NON) is a prominent example of CCN. In NON, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. This makes NDN a good architecture for efficient large scale content distribution. However, reliance on caching allows an adversary to perform attacks that are very effective and relatively easy to implement. Such attacks include cache poisoning (i.e., introducing malicious content into caches) and cache pollution (i.e., disrupting cache locality). This paper focuses on cache pollution attacks, where the adversary's goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers. We show, via simulations, that such attacks can be implemented in NON using limited resources, and that their effectiveness is not limited to small topologies. We then illustrate that existing proactive countermeasures are ineffective against realistic adversaries. Finally, we introduce a new technique for detecting pollution attacks. Our technique detects high and low rate attacks on different topologies with high accuracy. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:3178 / 3191
页数:14
相关论文
共 50 条
  • [31] Cache Sharing Using a Bloom Filter in Named Data Networking
    Mun, Ju Hyoung
    Lim, Hyesook
    PROCEEDINGS OF THE 2016 SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS'16), 2016, : 127 - 128
  • [32] Detection of Collusive Interest Flooding Attacks in Named Data Networking Using Wavelet Analysis
    Xin, Yonghui
    Li, Yang
    Wang, Wei
    Li, Weiyuan
    Chen, Xin
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 557 - 562
  • [33] Optimized in-network authentication against pollution attacks in software-defined-named data networking
    Boussaha, Ryma
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    Bessedik, Malika
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [34] Cache Management for Large Data Transfers in Named Data Networking using SDN
    Alhowaidi, Mohammad
    Nadig, Deepak
    Ramamurthy, Byrav
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [35] A Trusted Lightweight Communication Strategy for Flying Named Data Networking
    Barka, Ezedin
    Kerrache, Chaker Abdelaziz
    Hussain, Rasheed
    Lagraa, Nasreddine
    Lakas, Abderrahmane
    Bouk, Safdar Hussain
    SENSORS, 2018, 18 (08)
  • [36] Advanced Interest Flooding Attacks in Named-Data Networking
    Signorello, Salvatore
    Marchal, Samuel
    Francois, Jerome
    Festor, Olivier
    State, Radu
    2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 1 - 10
  • [37] Security Attacks in Named Data Networking: A Review and Research Directions
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Aleem, Abdul
    Srivastava, Shashank
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (06) : 1319 - 1350
  • [38] Effect of denial-of-service attacks on named data networking
    Wang, Kai
    Chen, Jia
    Zhou, Huachun
    Qin, Yajuan
    Zhang, Hongke
    ICIC Express Letters, 2013, 7 (07): : 2135 - 2140
  • [39] Security Attacks in Named Data Networking of Things and a Blockchain Solution
    Zhu, Konglin
    Chen, Zhicheng
    Yan, Wenke
    Zhang, Lin
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4733 - 4741
  • [40] Congestion avoidance by dynamically cache placement method in named data networking
    Babak Nikmard
    Naser Movahhedinia
    Mohammad Reza Khayyambashi
    The Journal of Supercomputing, 2022, 78 : 5779 - 5805