A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture

被引:6
作者
Hidouri, Abdelhak [1 ]
Touati, Haifa [1 ]
Hadded, Mohamed [2 ]
Hajlaoui, Nasreddine [1 ]
Muhlethaler, Paul [3 ]
机构
[1] Univ Gabes, Hatem Bettaher IResCoMath Lab, Gabes, Tunisia
[2] IRT SystemX, Palaiseau, France
[3] INRIA, Paris, France
来源
ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1 | 2022年 / 449卷
关键词
D O I
10.1007/978-3-030-99584-3_38
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Basic Named Data Networks (NDN) security mechanisms, rely on two main key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with congestion avoidance by storing, in the intermediate routers, the contents recently demanded to quickly serve future consumers' requests. The second key feature is the NDN security which stands on its foundation by signing each Data as soon as it released by the Producer and gets verified by each requesting consumer so that it makes it resilient to most attacks that affect the integrity of such content and the privacy of its end points. However, the availability of the Data in the cache of the CS allows the malicious consumers to perform several attacks such as Cache Pollution Attack (CPA) which is easy to implement and extremely effective. As a result, it makes the data on the cache unavailable for legitimate consumers and increases its retrieval delay. In this paper, we propose a new detection mechanism of CPA called ICAN (Intrusion detection system for CPA attack in NDN architecture) based on several metrics such as Average Cache Hit Ratio, Average Interest Inter-Arrival Time, Hop Count and Prefix variation. We assess by simulation, using the NDNSim framework, the efficiency of our mechanism and the choice of the used parameters. Finally, we elaborate a qualitative comparison between our proposed solution and the state-of-the-art mechanisms.
引用
收藏
页码:435 / 446
页数:12
相关论文
共 17 条
[1]  
[Anonymous], 2021, White Paper
[2]   Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways [J].
Ashraf, Suleman ;
Shawon, Mohammad H. ;
Khalid, Haris M. ;
Muyeen, S. M. .
SENSORS, 2021, 21 (19)
[3]   A lightweight mechanism for detection of cache pollution attacks in Named Data Networking [J].
Conti, Mauro ;
Gasti, Paolo ;
Teoli, Marco .
COMPUTER NETWORKS, 2013, 57 (16) :3178-3191
[4]   Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking [J].
Guo, Haoran ;
Wang, Xiaodong ;
Chang, Kun ;
Tian, Ye .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :2077-2090
[5]  
Hidouri A., 2021, P 2021 INT C SOFTWAR, P1
[6]  
Hyundo Park, 2012, IEEE International Conference on Communications (ICC 2012), P1096, DOI 10.1109/ICC.2012.6363885
[7]  
Kamimoto Takashi, 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P417, DOI 10.1109/CCNC.2016.7444816
[8]   An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking [J].
Karami, Amin ;
Guerrero-Zapata, Mane .
COMPUTER NETWORKS, 2015, 80 :51-65
[9]  
Kumar N, 2019, J COMPUT SCI TECH-CH, V34, P1319, DOI [10.1007/s11390-0191978-9, 10.1007/s11390-019-1978-9]
[10]  
Mejri S, 2018, IEEE WCNC