A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture

被引:6
|
作者
Hidouri, Abdelhak [1 ]
Touati, Haifa [1 ]
Hadded, Mohamed [2 ]
Hajlaoui, Nasreddine [1 ]
Muhlethaler, Paul [3 ]
机构
[1] Univ Gabes, Hatem Bettaher IResCoMath Lab, Gabes, Tunisia
[2] IRT SystemX, Palaiseau, France
[3] INRIA, Paris, France
关键词
D O I
10.1007/978-3-030-99584-3_38
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Basic Named Data Networks (NDN) security mechanisms, rely on two main key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with congestion avoidance by storing, in the intermediate routers, the contents recently demanded to quickly serve future consumers' requests. The second key feature is the NDN security which stands on its foundation by signing each Data as soon as it released by the Producer and gets verified by each requesting consumer so that it makes it resilient to most attacks that affect the integrity of such content and the privacy of its end points. However, the availability of the Data in the cache of the CS allows the malicious consumers to perform several attacks such as Cache Pollution Attack (CPA) which is easy to implement and extremely effective. As a result, it makes the data on the cache unavailable for legitimate consumers and increases its retrieval delay. In this paper, we propose a new detection mechanism of CPA called ICAN (Intrusion detection system for CPA attack in NDN architecture) based on several metrics such as Average Cache Hit Ratio, Average Interest Inter-Arrival Time, Hop Count and Prefix variation. We assess by simulation, using the NDNSim framework, the efficiency of our mechanism and the choice of the used parameters. Finally, we elaborate a qualitative comparison between our proposed solution and the state-of-the-art mechanisms.
引用
收藏
页码:435 / 446
页数:12
相关论文
共 50 条
  • [31] A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking
    Zhu, Yi
    Kang, Haohao
    Huang, Ruhui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (12): : 6123 - 6138
  • [32] On Performance of Cache Policies in Named Data Networking
    Ran, Jianhua
    Lv, Na
    Zhang, Ding
    Ma, Yuanyuan
    Xie, Zhenyong
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 668 - 671
  • [33] Cache Privacy in Named-Data Networking
    Acs, Gergely
    Conti, Mauro
    Gasti, Paolo
    Ghali, Cesar
    Tsudik, Gene
    2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 41 - 51
  • [34] Investigating Route Cache in Named Data Networking
    Chen, Xin
    Zhang, Guoqiang
    Cui, Huajun
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (02) : 296 - 299
  • [35] A new cache replacement policy in named data network based on FIB table information
    Hosseinzadeh, Mehran
    Moghim, Neda
    Taheri, Samira
    Gholami, Nasrin
    TELECOMMUNICATION SYSTEMS, 2024, 86 (03) : 585 - 596
  • [36] Dynamic Cooperative Cache Management Scheme Based on Social and Popular Data in Vehicular Named Data Network
    Ashraf, M. Wasim Abbas
    Huang, Chuanghe
    Raza, Khuhawar Arif
    Huang, Shidong
    Yin, Yabo
    Wu, Dong-Fang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [37] Dynamic Cooperative Cache Management Scheme Based on Social and Popular Data in Vehicular Named Data Network
    Ashraf, M. Wasim Abbas
    Huang, Chuanhe
    Raza, Khuhawar Arif
    Huang, Shidong
    Yin, Yabo
    Wu, Dong-Fang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [38] Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network
    C. Anand
    R. K. Gnanamurthy
    Wireless Personal Communications, 2016, 90 : 847 - 859
  • [39] Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network
    Anand, C.
    Gnanamurthy, R. K.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 847 - 859
  • [40] Cache attack detection in virtualized environments
    Tank, Darshan
    Aggarwal, Akshai
    Chaubey, Nirbhay
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2019, 40 (05): : 1109 - 1119