Skip to main content
Top

2019 | OriginalPaper | Chapter

Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking

Authors : Tetsuya Shigeyasu, Ayaka Sonoda

Published in: Advances in Network-Based Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, network consumers use Internet for getting contents: videos, musics, photos, and other contents created by many producers. Those contents accelerate the increasing traffic volumes. For reducing the increasing traffic volume to keep stabilities of broadband network, realizing the concept of CCN (Contents Centric Networking) is strongly required. The NDN (Named Data Networking) which is the most popular network architecture have been proposed to realize the concept of CCN. However, it have been also reported that the NDN is vulnerable to CIFA (Collusive Interest Flooding Attack). In this paper, we propose a novel distributed algorithm for detecting CIFA for keep availabilities of NDN. The results of computer simulations confirm that our proposal can detect and mitigate the effects of CIFA, effectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
According to the packet size and link bandwidth, each communication link can carries up to 100 packets during one second.
 
Literature
1.
go back to reference Dannewwitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–30 (2012)CrossRef Dannewwitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–30 (2012)CrossRef
2.
go back to reference Jacobson, V., Smetters, D., Thornton, J., Plass, M., Briggs, N., Braynard, R.: Networking named content. In: Proceedings of ACM CoNEXT 2009, pp. 1–12 (2009) Jacobson, V., Smetters, D., Thornton, J., Plass, M., Briggs, N., Braynard, R.: Networking named content. In: Proceedings of ACM CoNEXT 2009, pp. 1–12 (2009)
4.
go back to reference Soniya, M., Kumar, K.: A survey on named data networking. In: Proceedings of 2015 2nd International Conference on Electronics and Communication Systems (ICECS 2015), Coimbatore, pp. 1515–1519 (2015) Soniya, M., Kumar, K.: A survey on named data networking. In: Proceedings of 2015 2nd International Conference on Electronics and Communication Systems (ICECS 2015), Coimbatore, pp. 1515–1519 (2015)
5.
go back to reference Chen, Q., Xie, R., Yu, F., Liu, J., Huang, T., Liu, Y.: Transport control strategies in named data networking: a survey. IEEE Commun. Surv. Tutorials 18(3), 2052–2083 (2016)CrossRef Chen, Q., Xie, R., Yu, F., Liu, J., Huang, T., Liu, Y.: Transport control strategies in named data networking: a survey. IEEE Commun. Surv. Tutorials 18(3), 2052–2083 (2016)CrossRef
6.
go back to reference Amado, M., Campolo, C., Molinaro, A., Mitton, N.: Named data networking: a natural design for data collection in wireless sensor networks. In: Wireless Days (WD), 2013 IFIP, Valencia, pp. 1–6 (2013) Amado, M., Campolo, C., Molinaro, A., Mitton, N.: Named data networking: a natural design for data collection in wireless sensor networks. In: Wireless Days (WD), 2013 IFIP, Valencia, pp. 1–6 (2013)
7.
go back to reference Hail, M., Amado, M., Molinaro, A., Fischer, S.: Caching in named data networking for the wireless internet of things. In: Proceedings of 2015 International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015) Hail, M., Amado, M., Molinaro, A., Fischer, S.: Caching in named data networking for the wireless internet of things. In: Proceedings of 2015 International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015)
8.
go back to reference Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: A novel interest flooding attacks detection and countermeasure scheme in NDN. In: IEEE Global Communications Conference (GLOBECOM), Washington, DC 2016, pp. 1–7 (2016) Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: A novel interest flooding attacks detection and countermeasure scheme in NDN. In: IEEE Global Communications Conference (GLOBECOM), Washington, DC 2016, pp. 1–7 (2016)
9.
go back to reference Shinohara, R., Kamimoto, T., Sato, K., Shigeno, H.: Cache control method mitigating packet concentration of router caused by interest flooding attack. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin 2016, pp. 324–331 (2016) Shinohara, R., Kamimoto, T., Sato, K., Shigeno, H.: Cache control method mitigating packet concentration of router caused by interest flooding attack. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin 2016, pp. 324–331 (2016)
10.
go back to reference Sarah, H., Strufe, T.: Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In: Proceedings of 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 938-945 (2016) Sarah, H., Strufe, T.: Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In: Proceedings of 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 938-945 (2016)
11.
go back to reference Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, pp. 557–56 (2017) Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, pp. 557–56 (2017)
12.
go back to reference Breslan, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf–like distributions: evidence and implications. In: Proceedings of 18th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 1999), vol. 1, pp. 126–134 (1999) Breslan, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf–like distributions: evidence and implications. In: Proceedings of 18th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 1999), vol. 1, pp. 126–134 (1999)
Metadata
Title
Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking
Authors
Tetsuya Shigeyasu
Ayaka Sonoda
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-98530-5_7

Premium Partner