A Survey of Interest Flooding Attack in Named-Data Networking: Taxonomy, Performance and Future Research Challenges

2021 ◽  
pp. 1-19
Author(s):  
Ren-Ting Lee ◽  
Yu-Beng Leau ◽  
Yong Jin Park ◽  
Mohammed Anbar
Author(s):  
Linjun Yu ◽  
Huali Ai ◽  
Dong-Oun Choi

Named data networking (NDN) is a typical representation and implementation of information-centric networking and serves as a basis for the next-generation Internet. However, any network architectures will face information security threats. An attack named interest flooding attack (IFA), which is evolved, has becomes a great threat for NDN in recent years. Attackers through insert numerous forged interest packets into an NDN network, making the cache memory of NDN router(s) overrun, interest packets for the intended users. To take a comprehensive understanding of recent IFA detection and mitigation approaches, in this paper, we compared nine typical approaches to resolving IFA attacks for NDN, which are interest traceback, token bucket with per interface fairness, satisfaction-based interest acceptance, satisfaction-based push back, disabling PIT exhaustion, interest flow control method based on user reputation and content name prefixes, interest flow balancing method focused on the number of requests on named data networking, cryptographic route token, Poseidon local, and Poseidon distributed techniques. In addition, we conducted a simulation using Poseidon, a commonly used IFA resolution approach. The results showed that Poseidon could resolve IFA issues effectively.


2019 ◽  
Vol 11 (11) ◽  
pp. 241 ◽  
Author(s):  
Ioanna Angeliki Kapetanidou ◽  
Christos-Alexandros Sarros ◽  
Vassilis Tsaoussidis

Information-Centric Networking (ICN) has arisen as an architectural solution that responds to the needs of today’s overloaded Internet, departing from the traditional host-centric access paradigm. In this paper we focus on Named Data Networking (NDN), the most prominent ICN architecture. In the NDN framework, disseminated content is at the core of the design and providing trusted content is essential. In this paper, we provide an overview of reputation-based trust approaches, present their design trade-offs and argue that these approaches can consolidate NDN trust and security by working complementary to the existing credential-based schemes. Finally, we discuss future research directions and challenges.


2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Licheng Wang ◽  
Yun Pan ◽  
Mianxiong Dong ◽  
Yafang Yu ◽  
Kun Wang

As a kind of unwelcome, unavoidable, and malicious behavior, distributed denial of service (DDoS) is an ongoing issue in today’s Internet as well as in some newly conceived future Internet architectures. Recently, a first step was made towards assessing DDoS attacks in Named Data Networking (NDN)—one of the promising Internet architectures in the upcoming big data era. Among them, interest flooding attack (IFA) becomes one of the main serious problems. Enlightened by the extensive study on the possibility of mitigating DDoS in today’s Internet by employing micropayments, in this paper we address the possibility of introducing economic levers, say, dynamic pricing mechanism, and so forth, for regulating IFA in NDN.


2019 ◽  
Vol 14 (9) ◽  
pp. 2470-2485 ◽  
Author(s):  
Tan Nguyen ◽  
Hoang-Long Mai ◽  
Remi Cogranne ◽  
Guillaume Doyen ◽  
Wissam Mallouli ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document