A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture

被引:6
作者
Hidouri, Abdelhak [1 ]
Touati, Haifa [1 ]
Hadded, Mohamed [2 ]
Hajlaoui, Nasreddine [1 ]
Muhlethaler, Paul [3 ]
机构
[1] Univ Gabes, Hatem Bettaher IResCoMath Lab, Gabes, Tunisia
[2] IRT SystemX, Palaiseau, France
[3] INRIA, Paris, France
来源
ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1 | 2022年 / 449卷
关键词
D O I
10.1007/978-3-030-99584-3_38
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Basic Named Data Networks (NDN) security mechanisms, rely on two main key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with congestion avoidance by storing, in the intermediate routers, the contents recently demanded to quickly serve future consumers' requests. The second key feature is the NDN security which stands on its foundation by signing each Data as soon as it released by the Producer and gets verified by each requesting consumer so that it makes it resilient to most attacks that affect the integrity of such content and the privacy of its end points. However, the availability of the Data in the cache of the CS allows the malicious consumers to perform several attacks such as Cache Pollution Attack (CPA) which is easy to implement and extremely effective. As a result, it makes the data on the cache unavailable for legitimate consumers and increases its retrieval delay. In this paper, we propose a new detection mechanism of CPA called ICAN (Intrusion detection system for CPA attack in NDN architecture) based on several metrics such as Average Cache Hit Ratio, Average Interest Inter-Arrival Time, Hop Count and Prefix variation. We assess by simulation, using the NDNSim framework, the efficiency of our mechanism and the choice of the used parameters. Finally, we elaborate a qualitative comparison between our proposed solution and the state-of-the-art mechanisms.
引用
收藏
页码:435 / 446
页数:12
相关论文
共 17 条
[11]  
Mejri S, 2016, 2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC)
[12]   Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms [J].
Rios, Vinicius de Miranda ;
Inacio, Pedro R. M. ;
Magoni, Damien ;
Freire, Mario M. .
COMPUTER NETWORKS, 2021, 186
[13]   Named Data Networking-based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode [J].
Touati, Haifa ;
Aboud, Ahmed ;
Hnich, Brahim .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (03)
[14]   Fair hop-by-hop interest rate control to mitigate congestion in named data networks [J].
Touati, Haifa ;
Mejri, Safa ;
Malouch, Naceur ;
Kamoun, Farouk .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03) :2213-2230
[15]   An Accelerating Approach for Blockchain Information Transmission Based on NDN [J].
Yang, Zhi-Peng ;
Hua, Lu ;
Gao, Ning-Jie ;
Huo, Ru ;
Liu, Jiang ;
Huang, Tao .
FUTURE INTERNET, 2021, 13 (02) :1-14
[16]   Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks [J].
Yao, Lin ;
Fan, Zhenzhen ;
Deng, Jing ;
Fan, Xin ;
Wu, Guowei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1310-1321
[17]  
Zhang ZY, 2020, Arxiv, DOI arXiv:2009.09339