2020
DOI: 10.1109/tdsc.2018.2876257
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…Figure 7 shows the comparison result of the detection accuracy with the light weight mechanism method proposed in [17].…”
Section: Analysis Of Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 7 shows the comparison result of the detection accuracy with the light weight mechanism method proposed in [17].…”
Section: Analysis Of Resultsmentioning
confidence: 99%
“…e cache pollution attack in the IP network is mostly directed to the cache server, and the target of the cache pollution attack in the ICN is the routing node in the network. is also shows that, in ICN cache pollution attacks, cache routes are difficult to perceive the existence of attacks [16,17]. As an informationcentric network architecture with network cache, NDN is vulnerable to cache poisoning and pollution attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To detect an attack, the works [31] and [32] proposed that the cache hit ratio (CHR) can be used to detect the attack in cache pollution-related attacks. Due to the attack similarities between cache pollution and side-channel timing attack, the DaD attack detection is based on CHR calculations.…”
Section: A Adversary Face Detectionmentioning
confidence: 99%
“…Besides the attack performance calculation, the CHR can be used not only to detect an attack but also to identify the face of the router that is being attacked. For instance, the CHR can be used to identify the adversary in an attack detection for cache pollution [32] and [31]. Also, the works [11], [12], and [33] proposed that the side-channel timing attack can be identified by cache hits and misses.…”
Section: A Adversary Face Detectionmentioning
confidence: 99%