2017
DOI: 10.1109/access.2017.2754058
|View full text |Cite
|
Sign up to set email alerts
|

Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…Zhang et al 24 proposed a CPA defense approach based on popularity and cache locality. Their approach is a caching strategy, which prevents the polluted contents being stored into cache.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al 24 proposed a CPA defense approach based on popularity and cache locality. Their approach is a caching strategy, which prevents the polluted contents being stored into cache.…”
Section: Related Workmentioning
confidence: 99%
“…Attack Type Popularity Matric Memory Overhead Computational Overhead Park et al [17] LDA Entropy-based Detection Low High Xie et al [22] LDA Shield Function High High Conti et al [4] Both VOM Low Low Karami et al [13] Both ANFIS-based Decision Low Low Xu et al [23] Both LFM Sketch Low Low Kamimoto et al [12] FLA WRVP Low Low Salah et al [18] Both RR High Low Zhang et al [25] LDA COV and PPP Low Low Zen et al [20] FLA Four parameters High Low Singh and Ujjwal [24] Both Interest popularity High Low…”
Section: Refmentioning
confidence: 99%
“…Hence, the hit ratio of the requests generated by legitimate consumers decreases. Most of the countermeasures [17,22,4,13,23,12,18,25] employed for mitigating LDA are caching schemes based on the local popularity of contents. These schemes calculate the popularity of contents based on the statistics of the router.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, each interest that requests a blacklisted prefix will be dropped. Zhang et al [18] propose a mechanism based on the Coefficient of Variation (CV), where the decision is made based on several parameters, namely : The prefix received x, the interface from which the interest is received and the frequency of sending such an interest.…”
Section: Interest Flooding Attack and Its Impactmentioning
confidence: 99%