Detecting and Mitigating DDoS Attack in Named Data Networking

被引:11
作者
Alhisnawi, Mohammad [1 ]
Ahmadi, Mahmood [1 ]
机构
[1] Razi Univ, Dept Comp Engn & Informat Technol, Kermanshah, Iran
关键词
Named Data Networking Controller; Pending Interest Table; Distributed Denial of Service Attack; Interest Flooding Attack; Quotient based Cuckoo filter and Forwarding Information Base; INTEREST FLOODING ATTACK; SECURITY; FILTER;
D O I
10.1007/s10922-020-09539-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Named Data Networking (NDN) is a new and attractive paradigm that got a broad interest in recent researches as a potential alternative for the existing IP-based (host-based) Internet architecture. Security is considered explicitly as one of the most critical issues about NDN. Despite that NDN architecture presents higher resilience against most existing attacks, its architecture, nevertheless, can be exploited to start a DDoS attack. In the DDoS attack, the attacker tries to create and transmit a large number of fake Interest packets to increase network congestion and thus dropping legitimate interests by NDN routers. This paper proposes a new technique to detect and mitigate DDoS attacks in NDN that depends on cooperation among NDN routers with the help of a centralized controller. The functionality of these routers depends on their positions inside the autonomous system (AS). The simulation results show that the suggested technique is effective and precise to detect the fake name prefixes and, it offers better performance comparing with the previously proposed ones.
引用
收藏
页码:1343 / 1365
页数:23
相关论文
共 33 条
[1]  
Afanasyev A, 2013, P IFIP NETW C, P1
[2]   Named Data Networking for Software Defined Vehicular Networks [J].
Ahmed, Syed Hassan ;
Bouk, Safdar Hussain ;
Kim, Dongkyun ;
Rawat, Danda B. ;
Song, Houbing .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) :60-66
[3]   QCF for deep packet inspection [J].
Al-hisnawi, Mohammad ;
Ahmadi, Mahmood .
IET NETWORKS, 2018, 7 (05) :346-352
[4]  
[Anonymous], 2016, 2016 IEEE GLOB COMM
[5]  
[Anonymous], 2012, NDN0005
[6]   Security Issues in Named Data Networks [J].
Chatterjee, Tanusree ;
Ruj, Sushmita ;
Das Bit, Sipra .
COMPUTER, 2018, 51 (01) :66-75
[7]  
Compagno A, 2013, C LOCAL COMPUT NETW, P630, DOI 10.1109/LCN.2013.6761300
[8]   Cooperative detection and protection for Interest flooding attacks in named data networking [J].
Ding, Kun ;
Liu, Yun ;
Cho, Hsin-Hung ;
Chao, Han-Chieh ;
Shih, Timothy K. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (13) :1968-1980
[9]  
Gasti P, 2013, Computer Communications and Networks (ICCCN), 2013 22nd International Conference on, P1
[10]  
Goergen David., 2013, Data Privacy Management and Autonomous Spontaneous Security, P274