2013
DOI: 10.1007/978-3-642-35890-6_20
|View full text |Cite
|
Sign up to set email alerts
|

Security Monitoring for Content-Centric Networking

Abstract: Abstract. Content-Centric Networking (CCN) is one of the most promising research area for a future Internet. The goal is to obtain a more scalable, secure, collaborative Internet supporting context-aware services. However, as a new overlay infrastructure, CCN raises the need of a new monitoring architecture to assess security of CCN devices. In particular, the stateful nature of CCN routers introduces new attack threats that need to be addressed. We propose in this paper a monitoring approach for the instrumen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…The hierarchical structure of names can be used in this context to serve as the basis for a hierarchical public key infrastructure (PKI), so that the use of a namespace is certified by the authority controlling the superordinate namespace. For this work, we assume such a PKI and for more details on the security part of CCN refer to [6,15,27]. These related works also studied how CCN can withstand different attack scenarios and analyzed the risk induced by cached content.…”
Section: Overviewmentioning
confidence: 99%
“…The hierarchical structure of names can be used in this context to serve as the basis for a hierarchical public key infrastructure (PKI), so that the use of a namespace is certified by the authority controlling the superordinate namespace. For this work, we assume such a PKI and for more details on the security part of CCN refer to [6,15,27]. These related works also studied how CCN can withstand different attack scenarios and analyzed the risk induced by cached content.…”
Section: Overviewmentioning
confidence: 99%
“…Bianchi et al [23] and Detti et al [24] analyze the cost of content integrity verification with the Least Recently Used (LRU) caching strategy. Goergen et al [25] propose a CCN/NDN firewall to filter CCN packets according to content names. Cache pollution attacks and defenses are extensively discussed in [26]- [28].…”
Section: Related Workmentioning
confidence: 99%
“…C ← ENC P (C); 10: end if 11: else if ((i ∈ R † C ) && (C is 1-cacheable)) then 12: {y 1 , y 2 , · · · , y 2l } ← X † || X; 13: else if (C is all-cacheable) then 14: {y 1 , y 2 , · · · , y 2l } ← X || X; 15: end if {The rest of the algorithm (steps [16][17][18][19][20][21][22][23][24][25] is the same as steps 10-19 in Algorithm 1. }…”
Section: Algorithm 3 Live Signing Algorithm With Content Encryptionmentioning
confidence: 99%
“…A monitoring approach for instrumentation of CCN routers is discussed by Goergen et al using which the flooding attacks can be detected through monitoring of network traffic anomalies for the following parameters: number of bytes received per second, number of bytes sent per second, number of data packets received per second, number of data packets sent per second, number of interests received per second, and number of interests sent per second.…”
Section: Countermeasures Of Ccn‐dos Attacksmentioning
confidence: 99%
“…A monitoring approach for instrumentation of CCN routers is discussed by Goergen et al [37] using which the flooding attacks can be detected through monitoring of network traffic anomalies for the following parameters:…”
Section: Monitoring Of Traffic Anomaliesmentioning
confidence: 99%