A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture

被引:6
|
作者
Hidouri, Abdelhak [1 ]
Touati, Haifa [1 ]
Hadded, Mohamed [2 ]
Hajlaoui, Nasreddine [1 ]
Muhlethaler, Paul [3 ]
机构
[1] Univ Gabes, Hatem Bettaher IResCoMath Lab, Gabes, Tunisia
[2] IRT SystemX, Palaiseau, France
[3] INRIA, Paris, France
关键词
D O I
10.1007/978-3-030-99584-3_38
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Basic Named Data Networks (NDN) security mechanisms, rely on two main key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with congestion avoidance by storing, in the intermediate routers, the contents recently demanded to quickly serve future consumers' requests. The second key feature is the NDN security which stands on its foundation by signing each Data as soon as it released by the Producer and gets verified by each requesting consumer so that it makes it resilient to most attacks that affect the integrity of such content and the privacy of its end points. However, the availability of the Data in the cache of the CS allows the malicious consumers to perform several attacks such as Cache Pollution Attack (CPA) which is easy to implement and extremely effective. As a result, it makes the data on the cache unavailable for legitimate consumers and increases its retrieval delay. In this paper, we propose a new detection mechanism of CPA called ICAN (Intrusion detection system for CPA attack in NDN architecture) based on several metrics such as Average Cache Hit Ratio, Average Interest Inter-Arrival Time, Hop Count and Prefix variation. We assess by simulation, using the NDNSim framework, the efficiency of our mechanism and the choice of the used parameters. Finally, we elaborate a qualitative comparison between our proposed solution and the state-of-the-art mechanisms.
引用
收藏
页码:435 / 446
页数:12
相关论文
共 50 条
  • [1] Collaborative detection mechanism for low-rate cache pollution attack in named data networking
    Zhu, Yi
    Shi, Jia
    Gong, Pu
    Cao, Qing-Hua
    Su, Dong
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (06): : 44 - 48
  • [2] A lightweight mechanism for detection of cache pollution attacks in Named Data Networking
    Conti, Mauro
    Gasti, Paolo
    Teoli, Marco
    COMPUTER NETWORKS, 2013, 57 (16) : 3178 - 3191
  • [3] Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks
    Wang, Hanbo
    Man, Dapeng
    Han, Shuai
    Wang, Huanran
    Yang, Wu
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 545 - 556
  • [4] Mitigating Cache Pollution Attack Using Deep Learning in Named Data Networking (NDN)
    Hamdi, Mohd Maizan Fishol
    Chen, Zhiyuan
    Radenkovic, Milena
    INTELLIGENT COMPUTING, VOL 2, 2024, 2024, 1017 : 432 - 442
  • [5] Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
    Yao, Lin
    Zeng, Yujie
    Wang, Xin
    Chen, Ailun
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2848 - 2860
  • [6] Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks
    Yao, Lin
    Fan, Zhenzhen
    Deng, Jing
    Fan, Xin
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1310 - 1321
  • [7] Detection and Defense Schemes for Cache Pollution Attack in Content-Centric Network
    Cao, Yang
    Wu, Disheng
    Hu, Mingrui
    Chen, Shu
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 614 - 629
  • [8] Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network
    Yao, Lin
    Li, Jia
    Deng, Jing
    Wu, Guowei
    COMPUTERS & SECURITY, 2023, 124
  • [9] Assuaging cache based attacks in Named Data Network
    Adithya, S.
    Karthik, Gowtham G.
    Hariharan, H.
    Vetriselvi, V.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 872 - 876
  • [10] A Simulation of Cache Replacement Strategy on Named Data Network
    Situmorang, Hamonangan
    Syambas, Nana Rachmana
    Juhana, Tutun
    Edward, Ian Yosef Matheus
    2018 12TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS, SERVICES, AND APPLICATIONS (TSSA), 2018,