Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking

被引:38
|
作者
Guo, Haoran [1 ]
Wang, Xiaodong [1 ]
Chang, Kun [1 ]
Tian, Ye [1 ]
机构
[1] Univ Sci & Technol China, Anhui Key Lab High Performance Comp & Applicat, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
基金
中国国家自然科学基金;
关键词
Future Internet architecture; cache pollution attack; network security;
D O I
10.1109/TIFS.2016.2574307
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With information becoming a first-class citizen on the Internet, information-centric networking (ICN) is considered as a promising direction for the future Internet. Named data networking (NDN) is a prominent example of emerging ICN architectures. Unfortunately, NDN is vulnerable to various attacks targeting its in-network caching mechanism. In this paper, we focus on the false-locality pollution attack, in which an adversary repeatedly requests a number of unpopular data objects to waste the precious cache space on the NDN router and to reduce normal users' hit ratios. With simulation experiments, we show that such an attack can cause considerable damage to the NDN network. To detect and mitigate such an attack, we introduce an algorithm that exploits the diversity of the Interest traversing paths within an Internet service provider's point-of-presence network. We also propose inexpensive methodologies based on the probabilistic counting and Bloom filter techniques to implement the algorithm on an NDN router. The experimental results indicate that our proposed algorithm is effective in thwarting false-locality pollution. We also experiment with strategies that the adversary may utilize against our antipollution algorithm and demonstrate that such strategies are either ineffective or impractical in the real world.
引用
收藏
页码:2077 / 2090
页数:14
相关论文
共 50 条
  • [31] Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data Networking
    Kondo, Daishi
    Silverston, Thomas
    Vassiliades, Vassilis
    Tode, Hideki
    Asami, Tohru
    IEEE ACCESS, 2018, 6 : 65151 - 65170
  • [32] Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
    Yao, Lin
    Zeng, Yujie
    Wang, Xin
    Chen, Ailun
    Wu, Guowei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2848 - 2860
  • [33] Data Aggregation in Named Data Networking
    Harada, Sho
    Yan, Zhiwei
    Park, Yong-Jin
    Nisar, Kashif
    Ibrahim, Ag Asri Ag
    TENCON 2017 - 2017 IEEE REGION 10 CONFERENCE, 2017, : 1839 - 1842
  • [34] A SURVEY ON NAMED DATA NETWORKING
    Soniya, M. Micheal Santha
    Kumar, K.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1515 - 1519
  • [35] Named Data Networking: A survey
    Saxena, Divya
    Raychoudhury, Vaskar
    Suri, Neeraj
    Becker, Christian
    Cao, Jiannong
    COMPUTER SCIENCE REVIEW, 2016, 19 : 15 - 55
  • [36] Named-Data Security Scheme for Named Data Networking
    Hamdane, Balkis
    Serhrouchni, Ahmed
    Fadlallah, Ahmad
    El Fatmi, Sihem Guemara
    2012 THIRD INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2012, : 114 - 119
  • [37] A Novel Multi-path Traffic Control Mechanism in Named Data Networking
    Li, Chengcheng
    Huang, Tao
    Xie, Renchao
    Zhang, Hengyang
    Liu, Jiang
    Liu, Yunjie
    2015 22ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2015, : 60 - 66
  • [38] IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things
    Bilgili, Sedat
    Demir, Alper Kamil
    Alam, Shahid
    INTERNET OF THINGS, 2024, 25
  • [39] Detection of Collusive Interest Flooding Attacks in Named Data Networking Using Wavelet Analysis
    Xin, Yonghui
    Li, Yang
    Wang, Wei
    Li, Weiyuan
    Chen, Xin
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 557 - 562
  • [40] Trident: Defensing Synergetic Denial-of-Service Attacks in Underwater Named Data Networking
    Li, Yue
    Liu, Yingjian
    Yin, Haoyu
    Guo, Zhongwen
    Wang, Yu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) : 20633 - 20648