Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

被引:18
作者
Aamir, Muhammad [1 ]
Zaidi, Syed Mustafa Ali [2 ]
机构
[1] Natl Bank Pakistan, Div Informat Technol, Karachi, Pakistan
[2] SZABIST, Fac Comp, Karachi, Pakistan
关键词
CCN; DoS; flooding; network; security; INTEREST FLOODING ATTACKS; POLLUTION ATTACKS; THREATS;
D O I
10.1002/sec.1149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content centric networking (CCN) is a paradigm shift from current Internet protocol-address-based communication model to content-oriented model in computer networks. Like traditional networks, it is identified that CCN is also vulnerable to many security threats including denial-of-service (DoS). This fact has recently caught a considerable attention in research community while different proposals of defense are being published. In this paper, we provide a literature review on different types of possible DoS attacks in CCN and their proposed countermeasures. DoS attacks can be triggered in CCN to exhaust resources within a CCN router or the ultimate content source(s). Two characteristics of CCN, that is, state maintenance of forwarded requests in a router using pending interest table and the fact that a response (content) follows the same path in reverse direction through which the corresponding request (interest) travels have been taken as major advantages to fight against DoS attacks in CCN under different proposed approaches. This survey makes a contribution by (a) highlighting state-of-the-art work in a tutorial manner on the exploration of different DoS attacks and their countermeasures in CCN, (b) identifying some potential problems of current CCN features and existing proposals of defense, and (c) forecasting and providing an overview of a few possible future techniques to help researchers fight against CCN-DoS attacks. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2037 / 2059
页数:23
相关论文
共 62 条
  • [1] Aamir M., 2013, INTERDISCIP INF SCI, V19, P173, DOI DOI 10.4036/iis.2013.173
  • [2] Cache Privacy in Named-Data Networking
    Acs, Gergely
    Conti, Mauro
    Gasti, Paolo
    Ghali, Cesar
    Tsudik, Gene
    [J]. 2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 41 - 51
  • [3] Afanasyev A, 2013, P IFIP NETW C MAY 20
  • [4] Ahlgren B, 2010, D62V20 4WARD EU FP7
  • [5] A Survey of Information-Centric Networking
    Ahlgren, Bengt
    Dannewitz, Christian
    Imbrenda, Claudio
    Kutscher, Dirk
    Ohlman, Boerje
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (07) : 26 - 36
  • [6] Ali W, 2011, Journal of Advances in Soft Computing and its Applications, V3, P18
  • [7] [Anonymous], 2011, P ACM SIGCOMM WORKSH
  • [8] AN OVERVIEW OF WEB CACHING REPLACEMENT ALGORITHMS
    Balamash, Abdullah
    Krunz, Marwan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2004, 6 (02): : 44 - 56
  • [9] From content delivery today to information centric networking
    Carofiglio, G.
    Morabito, G.
    Muscariello, L.
    Solis, I.
    Varvello, M.
    [J]. COMPUTER NETWORKS, 2013, 57 (16) : 3116 - 3127
  • [10] Chaabane A, 2013, ACM SIGCOMM C