Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking

被引:38
|
作者
Guo, Haoran [1 ]
Wang, Xiaodong [1 ]
Chang, Kun [1 ]
Tian, Ye [1 ]
机构
[1] Univ Sci & Technol China, Anhui Key Lab High Performance Comp & Applicat, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
基金
中国国家自然科学基金;
关键词
Future Internet architecture; cache pollution attack; network security;
D O I
10.1109/TIFS.2016.2574307
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With information becoming a first-class citizen on the Internet, information-centric networking (ICN) is considered as a promising direction for the future Internet. Named data networking (NDN) is a prominent example of emerging ICN architectures. Unfortunately, NDN is vulnerable to various attacks targeting its in-network caching mechanism. In this paper, we focus on the false-locality pollution attack, in which an adversary repeatedly requests a number of unpopular data objects to waste the precious cache space on the NDN router and to reduce normal users' hit ratios. With simulation experiments, we show that such an attack can cause considerable damage to the NDN network. To detect and mitigate such an attack, we introduce an algorithm that exploits the diversity of the Interest traversing paths within an Internet service provider's point-of-presence network. We also propose inexpensive methodologies based on the probabilistic counting and Bloom filter techniques to implement the algorithm on an NDN router. The experimental results indicate that our proposed algorithm is effective in thwarting false-locality pollution. We also experiment with strategies that the adversary may utilize against our antipollution algorithm and demonstrate that such strategies are either ineffective or impractical in the real world.
引用
收藏
页码:2077 / 2090
页数:14
相关论文
共 50 条
  • [21] NDN-Trace: A Path Tracing Utility for Named Data Networking
    Khoussi, Siham
    Pesavento, Davide
    Benmohamed, Lotfi
    Battou, Abdella
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 116 - 122
  • [22] Parallel Multi-path Forwarding Strategy for Named Data Networking
    Bouacherine, Abdelkader
    Senouci, Mustapha Reda
    Merabti, Billal
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 36 - 46
  • [23] Multi-classifier and meta-heuristic based cache pollution attacks and interest flooding attacks detection and mitigation model for named data networking
    Buvanesvari, R.
    Joseph, Suresh K.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (06) : 839 - 864
  • [24] Cooperative-Filter: countering Interest flooding attacks in named data networking
    Wang, Kai
    Zhou, Huachun
    Qin, Yajuan
    Zhang, Hongke
    SOFT COMPUTING, 2014, 18 (09) : 1803 - 1813
  • [25] Cooperative-Filter: countering Interest flooding attacks in named data networking
    Kai Wang
    Huachun Zhou
    Yajuan Qin
    Hongke Zhang
    Soft Computing, 2014, 18 : 1803 - 1813
  • [26] Detection of Interest Flooding Attacks in Named Data Networking using Hypothesis Testing
    Nguyen, Tan N.
    Cogranne, Remi
    Doyen, Guillaume
    Retraint, Florent
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [27] A survey on interest packet flooding attacks and its countermeasures in named data networking
    Rabari Jeet
    P. Arun Raj Kumar
    International Journal of Information Security, 2022, 21 : 1163 - 1187
  • [28] A survey on interest packet flooding attacks and its countermeasures in named data networking
    Jeet, Rabari
    Kumar, P. Arun Raj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (05) : 1163 - 1187
  • [29] Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
    Li, Yue
    Liu, Yingjian
    Wang, Yu
    Guo, Zhongwen
    Yin, Haoyu
    Teng, Hao
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1569 - 1578
  • [30] Kiram and WOE : Distributed Denial of Service Attacks in Named-Data Networking
    Hussain, Mohibi
    Crowcroft, Jon
    2018 IEEE 26TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2018, : 255 - 256