2014
DOI: 10.1002/dac.2883
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative detection and protection for Interest flooding attacks in named data networking

Abstract: Summary Named data networking (NDN) is a new emerging architecture for future network, which may be a substitute of the current TCP/IP‐based network, for the content‐oriented data request mode becoming the future trend of development. The security of NDN has attracted much attention, as an implementation of next‐generation Internet architecture. Although NDN is immune to most current attack, it cannot resist the distributed denial of service like attack – Interest flooding attack (IFA) – effectively. IFA takes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 25 publications
0
13
0
Order By: Relevance
“…As opposed to previous works, the routers work independently, and false alarm probability can be controlled by selecting a well-defined threshold. Furthermore, the detection threshold given a particular false-alarm probability considering packet loss probability is derived in Nguyen et al 19 In Ding et al, 24 the authors proposed to use vector space model and Markov model to detect a DDoS attack in NDN. A retransmission method is proposed for ensuring the legitimate user request.…”
Section: Dos/ddos Mitigation In Icnmentioning
confidence: 99%
“…As opposed to previous works, the routers work independently, and false alarm probability can be controlled by selecting a well-defined threshold. Furthermore, the detection threshold given a particular false-alarm probability considering packet loss probability is derived in Nguyen et al 19 In Ding et al, 24 the authors proposed to use vector space model and Markov model to detect a DDoS attack in NDN. A retransmission method is proposed for ensuring the legitimate user request.…”
Section: Dos/ddos Mitigation In Icnmentioning
confidence: 99%
“…More recently, research [12] argues that IFA can be easily launched even when the attackers have very limited resource, and suggest to notify the user identifier of each attacker by the edge routers which detect IFA, meanwhile to employ router authentication mechanism so that malicious notification messages from compromised routers can be prevent, which is efficient and effective even in future fifth generation (5G) cellular networks where edge routers may join and leave the network frequently. In addition, the work in [13] employs an interest marking mechanism into every edge NDN router, and every interest packet travelling through an edge NDN router is firstly marked with the identification code (ID) of this router before being forwarded, which helps the identification of the malicious area, and achieves cooperative detection with the help of modelling three properties of IFA: PIT occupancy ratio, PIT expire ratio and potential attacker ratio (e.g. a value deduced from the edge router ID where most malicious interest packets originate currently).…”
Section: Related Workmentioning
confidence: 99%
“…a value deduced from the edge router ID where most malicious interest packets originate currently). Moreover, the authors in [13] also introduced a retransmission forwarding mechanism to ensure legitimate interest packets, based on the fact that malicious interest packets are with varying names to enhance resource consumption of PIT, while the legitimate interest packets are retransmitted with the same name if the requested content is not returned.Similarly, the work in [14] argues that the fake interest packets should be responded by certain fake data packets to reduce the burden of involved routers along the attacking path, and thus they design the mechanism named ‘interest traceback’ to achieve above goals. In fact, the effect of interest traceback is the same with Interest NACK.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The first two solutions (Interests with long timeout and never dying PIT entries) are theoretically possible, but they are not completely scalable because they require to store a massive amount of state on intermediate routers for a possibly long time. The situation can even get worse in case of malicious attacks, as many recent papers demonstrated . For this reason, we do not consider them in our evaluation section, as we are interested in Internet scale applications (like a social network application is).…”
Section: Related Workmentioning
confidence: 99%