Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking

被引:38
|
作者
Guo, Haoran [1 ]
Wang, Xiaodong [1 ]
Chang, Kun [1 ]
Tian, Ye [1 ]
机构
[1] Univ Sci & Technol China, Anhui Key Lab High Performance Comp & Applicat, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
基金
中国国家自然科学基金;
关键词
Future Internet architecture; cache pollution attack; network security;
D O I
10.1109/TIFS.2016.2574307
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With information becoming a first-class citizen on the Internet, information-centric networking (ICN) is considered as a promising direction for the future Internet. Named data networking (NDN) is a prominent example of emerging ICN architectures. Unfortunately, NDN is vulnerable to various attacks targeting its in-network caching mechanism. In this paper, we focus on the false-locality pollution attack, in which an adversary repeatedly requests a number of unpopular data objects to waste the precious cache space on the NDN router and to reduce normal users' hit ratios. With simulation experiments, we show that such an attack can cause considerable damage to the NDN network. To detect and mitigate such an attack, we introduce an algorithm that exploits the diversity of the Interest traversing paths within an Internet service provider's point-of-presence network. We also propose inexpensive methodologies based on the probabilistic counting and Bloom filter techniques to implement the algorithm on an NDN router. The experimental results indicate that our proposed algorithm is effective in thwarting false-locality pollution. We also experiment with strategies that the adversary may utilize against our antipollution algorithm and demonstrate that such strategies are either ineffective or impractical in the real world.
引用
收藏
页码:2077 / 2090
页数:14
相关论文
共 50 条
  • [1] A lightweight mechanism for detection of cache pollution attacks in Named Data Networking
    Conti, Mauro
    Gasti, Paolo
    Teoli, Marco
    COMPUTER NETWORKS, 2013, 57 (16) : 3178 - 3191
  • [2] Security and Integrity Attacks in Named Data Networking: A Survey
    Shah, Mohammad Shahrul Mohd
    Leau, Yu-Beng
    Anbar, Mohammed
    Bin-Salem, Ali Abdulqader
    IEEE ACCESS, 2023, 11 : 7984 - 8004
  • [3] A Method for Joint Detection of Attacks in Named Data Networking
    Wu Z.
    Zhang R.
    Yue M.
    1600, Science Press (58): : 569 - 582
  • [4] Optimized in-network authentication against pollution attacks in software-defined-named data networking
    Boussaha, Ryma
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    Bessedik, Malika
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [5] An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
    Karami, Amin
    Guerrero-Zapata, Mane
    COMPUTER NETWORKS, 2015, 80 : 51 - 65
  • [6] Opportunistic On-Path Caching for Named Data Networking
    Hu, Xiaoyan
    Gong, Jian
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2014, E97B (11) : 2360 - 2367
  • [7] Advanced Interest Flooding Attacks in Named-Data Networking
    Signorello, Salvatore
    Marchal, Samuel
    Francois, Jerome
    Festor, Olivier
    State, Radu
    2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 1 - 10
  • [8] Effect of denial-of-service attacks on named data networking
    Wang, Kai
    Chen, Jia
    Zhou, Huachun
    Qin, Yajuan
    Zhang, Hongke
    ICIC Express Letters, 2013, 7 (07): : 2135 - 2140
  • [9] Security Attacks in Named Data Networking: A Review and Research Directions
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Aleem, Abdul
    Srivastava, Shashank
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (06) : 1319 - 1350
  • [10] Security Attacks in Named Data Networking of Things and a Blockchain Solution
    Zhu, Konglin
    Chen, Zhicheng
    Yan, Wenke
    Zhang, Lin
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4733 - 4741