Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions

被引:28
作者
Benmoussa, Ahmed [1 ,4 ]
Kerrache, Chaker Abdelaziz [1 ]
Lagraa, Nasreddine [1 ]
Mastorakis, Spyridon [2 ]
Lakas, Abderrahmane [3 ]
Tahari, Abdou El Karim [1 ]
机构
[1] Univ Amar Telidji Laghouat, Lab Informat & Math, Route 1, Laghouat 03000, Algeria
[2] Univ Nebraska, 6001 Dodge St,174E PKI, Omaha, NE 68182 USA
[3] United Arab Emirates Univ, Coll Informat Technol, POB 15551, Al Ain, U Arab Emirates
[4] Ctr Univ Aflou, Dept Math & Informat, BP 306, Aflou, Laghouat, Algeria
基金
美国国家科学基金会; 美国国家卫生研究院;
关键词
Named Data Networking (NDN); Interest Flooding Attack (IFA); survey; INFORMATION-CENTRIC NETWORKING; DEFENSE-MECHANISM; SECURITY ATTACKS; ACCESS-CONTROL; COUNTERMEASURE; MITIGATION; PRIVACY;
D O I
10.1145/3539730
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a new architecture come new threats, and NDN is no exception. NDN is a potential target for new network attacks such as Interest Flooding Attacks (IFAs). Attackers take advantage of IFA to launch (D)DoS attacks in NDN. Many IFA detection and mitigation solutions have been proposed in the literature. However, there is no comprehensive review study of these solutions that has been proposed so far. Therefore, in this article, we propose a survey of the various IFAs with a detailed comparative study of all the relevant proposed solutions as counter-measures against IFAs. We also review the requirements for a complete and efficient IFA solution and pinpoint the various issues encountered by IFA detection and mitigation mechanisms through a series of attack scenarios. Finally, in this survey, we offer an analysis of the open issues and future research directions regarding IFAs.
引用
收藏
页数:37
相关论文
共 115 条
[1]   Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey [J].
Aamir, Muhammad ;
Zaidi, Syed Mustafa Ali .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) :2037-2059
[2]   A Survey of Security Attacks in Information-Centric Networking [J].
AbdAllah, Eslam G. ;
Hassanein, Hossam S. ;
Zulkernine, Mohammad .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1441-1454
[3]  
Afanasyev A., 2013, Imaging structural co-variance between human brain regions, P1
[4]  
Afanasyev A, 2017, 26 INT C COMPUTER CO
[5]   Content-Based Security for the Web [J].
Afanasyev, Alexander ;
Halderman, J. Alex ;
Ruoti, Scott ;
Seamons, Kent ;
Yu, Yingdi ;
Zappala, Daniel ;
Zhang, Lixia .
PROCEEDINGS OF THE 2016 NEW SECURITY PARADIGMS WORKSHOP (NSPW'16), 2016, :49-60
[6]   A Survey of Information-Centric Networking [J].
Ahlgren, Bengt ;
Dannewitz, Christian ;
Imbrenda, Claudio ;
Kutscher, Dirk ;
Ohlman, Boerje .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) :26-36
[7]   Detecting and Mitigating DDoS Attack in Named Data Networking [J].
Alhisnawi, Mohammad ;
Ahmadi, Mahmood .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2020, 28 (04) :1343-1365
[8]  
Alston A, 2016, 15TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (IEEE NCA 2016), P85, DOI 10.1109/NCA.2016.7778598
[9]   Security and Privacy Analysis of National Science Foundation Future Internet Architectures [J].
Ambrosin, Moreno ;
Compagno, Alberto ;
Conti, Mauro ;
Ghali, Cesar ;
Tsudik, Gene .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02) :1418-1442
[10]  
Anand A., 2011, P 10 ACM WORKSH HOT, P1