A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

被引:111
|
作者
Conti, Mauro [1 ]
Gasti, Paolo [2 ]
Teoli, Marco [1 ]
机构
[1] Univ Padua, Dept Math, I-35131 Padua, Italy
[2] New York Inst Technol, Sch Engn & Comp Sci, New York, NY 10023 USA
基金
美国国家科学基金会;
关键词
Named data networking; Cache pollution attack; Security;
D O I
10.1016/j.comnet.2013.07.034
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Content-Centric Networking (CCN) is an emerging paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content - rather than addressable hosts - becomes a first-class entity. Content is therefore decoupled from its location. This allows, among other things, the implementation of ubiquitous caching. Named-Data Networking (NON) is a prominent example of CCN. In NON, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. This makes NDN a good architecture for efficient large scale content distribution. However, reliance on caching allows an adversary to perform attacks that are very effective and relatively easy to implement. Such attacks include cache poisoning (i.e., introducing malicious content into caches) and cache pollution (i.e., disrupting cache locality). This paper focuses on cache pollution attacks, where the adversary's goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers. We show, via simulations, that such attacks can be implemented in NON using limited resources, and that their effectiveness is not limited to small topologies. We then illustrate that existing proactive countermeasures are ineffective against realistic adversaries. Finally, we introduce a new technique for detecting pollution attacks. Our technique detects high and low rate attacks on different topologies with high accuracy. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:3178 / 3191
页数:14
相关论文
共 50 条
  • [41] Congestion avoidance by dynamically cache placement method in named data networking
    Nikmard, Babak
    Movahhedinia, Naser
    Khayyambashi, Mohammad Reza
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (04): : 5779 - 5805
  • [42] A Cache Placement Strategy Based on Compound Popularity in Named Data Networking
    Gui, Yiqi
    Chen, Yongkang
    IEEE ACCESS, 2020, 8 : 196002 - 196012
  • [43] A Cache Invalidation Strategy Based on Publish/Subscribe for Named Data Networking
    Kan, Yuanzhi
    Zheng, Quan
    Yang, Jian
    Tan, Xiaobin
    IEEE ACCESS, 2020, 8 : 80074 - 80085
  • [44] Hybrid Cache Management in IoT-Based Named Data Networking
    Naeem, Muhammad Ali
    Nguyen, Tu N.
    Ali, Rashid
    Cengiz, Korhan
    Meng, Yahui
    Khurshaid, Tahir
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) : 7140 - 7150
  • [45] Detection of Cache Pollution Attacks Using Randomness Checks
    Park, Hyundo
    Widjaja, Indra
    Lee, Heejo
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [46] Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks
    Wang, Hanbo
    Man, Dapeng
    Han, Shuai
    Wang, Huanran
    Yang, Wu
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 545 - 556
  • [47] Towards a novel cache replacement strategy for Named Data Networking based on Software Defined Networking
    Kalghoum, Anwar
    Gammar, Sonia Mettali
    Saidane, Leila Azouz
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 : 98 - 113
  • [48] Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking
    Hidouri, Abdelhak
    Touati, Haifa
    Hadded, Mohamed
    Hajlaoui, Nasreddine
    Muhlethaler, Paul
    Bouzefrane, Samia
    COMPUTER NETWORKS, 2023, 235
  • [49] Cache management for large data transfers and multipath forwarding strategies in Named Data Networking
    Alhowaidi, Mohammad
    Nadig, Deepak
    Hu, Boyang
    Ramamurthy, Byrav
    Bockelman, Brian
    COMPUTER NETWORKS, 2021, 199
  • [50] Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking
    Xing, Guanglin
    Chen, Jing
    Hou, Rui
    Zhou, Lingyun
    Dong, Mianxiong
    Zeng, Deze
    Luo, Jiangtao
    Ma, Maode
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (03) : 98 - 103