Skip to main content

2019 | OriginalPaper | Buchkapitel

Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking

verfasst von : Tetsuya Shigeyasu, Ayaka Sonoda

Erschienen in: Advances in Network-Based Information Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, network consumers use Internet for getting contents: videos, musics, photos, and other contents created by many producers. Those contents accelerate the increasing traffic volumes. For reducing the increasing traffic volume to keep stabilities of broadband network, realizing the concept of CCN (Contents Centric Networking) is strongly required. The NDN (Named Data Networking) which is the most popular network architecture have been proposed to realize the concept of CCN. However, it have been also reported that the NDN is vulnerable to CIFA (Collusive Interest Flooding Attack). In this paper, we propose a novel distributed algorithm for detecting CIFA for keep availabilities of NDN. The results of computer simulations confirm that our proposal can detect and mitigate the effects of CIFA, effectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
According to the packet size and link bandwidth, each communication link can carries up to 100 packets during one second.
 
Literatur
1.
Zurück zum Zitat Dannewwitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–30 (2012)CrossRef Dannewwitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–30 (2012)CrossRef
2.
Zurück zum Zitat Jacobson, V., Smetters, D., Thornton, J., Plass, M., Briggs, N., Braynard, R.: Networking named content. In: Proceedings of ACM CoNEXT 2009, pp. 1–12 (2009) Jacobson, V., Smetters, D., Thornton, J., Plass, M., Briggs, N., Braynard, R.: Networking named content. In: Proceedings of ACM CoNEXT 2009, pp. 1–12 (2009)
4.
Zurück zum Zitat Soniya, M., Kumar, K.: A survey on named data networking. In: Proceedings of 2015 2nd International Conference on Electronics and Communication Systems (ICECS 2015), Coimbatore, pp. 1515–1519 (2015) Soniya, M., Kumar, K.: A survey on named data networking. In: Proceedings of 2015 2nd International Conference on Electronics and Communication Systems (ICECS 2015), Coimbatore, pp. 1515–1519 (2015)
5.
Zurück zum Zitat Chen, Q., Xie, R., Yu, F., Liu, J., Huang, T., Liu, Y.: Transport control strategies in named data networking: a survey. IEEE Commun. Surv. Tutorials 18(3), 2052–2083 (2016)CrossRef Chen, Q., Xie, R., Yu, F., Liu, J., Huang, T., Liu, Y.: Transport control strategies in named data networking: a survey. IEEE Commun. Surv. Tutorials 18(3), 2052–2083 (2016)CrossRef
6.
Zurück zum Zitat Amado, M., Campolo, C., Molinaro, A., Mitton, N.: Named data networking: a natural design for data collection in wireless sensor networks. In: Wireless Days (WD), 2013 IFIP, Valencia, pp. 1–6 (2013) Amado, M., Campolo, C., Molinaro, A., Mitton, N.: Named data networking: a natural design for data collection in wireless sensor networks. In: Wireless Days (WD), 2013 IFIP, Valencia, pp. 1–6 (2013)
7.
Zurück zum Zitat Hail, M., Amado, M., Molinaro, A., Fischer, S.: Caching in named data networking for the wireless internet of things. In: Proceedings of 2015 International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015) Hail, M., Amado, M., Molinaro, A., Fischer, S.: Caching in named data networking for the wireless internet of things. In: Proceedings of 2015 International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015)
8.
Zurück zum Zitat Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: A novel interest flooding attacks detection and countermeasure scheme in NDN. In: IEEE Global Communications Conference (GLOBECOM), Washington, DC 2016, pp. 1–7 (2016) Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: A novel interest flooding attacks detection and countermeasure scheme in NDN. In: IEEE Global Communications Conference (GLOBECOM), Washington, DC 2016, pp. 1–7 (2016)
9.
Zurück zum Zitat Shinohara, R., Kamimoto, T., Sato, K., Shigeno, H.: Cache control method mitigating packet concentration of router caused by interest flooding attack. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin 2016, pp. 324–331 (2016) Shinohara, R., Kamimoto, T., Sato, K., Shigeno, H.: Cache control method mitigating packet concentration of router caused by interest flooding attack. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin 2016, pp. 324–331 (2016)
10.
Zurück zum Zitat Sarah, H., Strufe, T.: Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In: Proceedings of 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 938-945 (2016) Sarah, H., Strufe, T.: Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In: Proceedings of 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 938-945 (2016)
11.
Zurück zum Zitat Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, pp. 557–56 (2017) Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, pp. 557–56 (2017)
12.
Zurück zum Zitat Breslan, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf–like distributions: evidence and implications. In: Proceedings of 18th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 1999), vol. 1, pp. 126–134 (1999) Breslan, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf–like distributions: evidence and implications. In: Proceedings of 18th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 1999), vol. 1, pp. 126–134 (1999)
Metadaten
Titel
Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking
verfasst von
Tetsuya Shigeyasu
Ayaka Sonoda
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-98530-5_7