scholarly journals The Producer-Consumer Collusion Attack in Content-Centric Networks

2016 ◽  
Vol 2 (1) ◽  
pp. 48
Author(s):  
André Luiz Nasserala Pires ◽  
Igor Monteiro Moraes

<p>This paper evaluates a denial-of-service attack in<br />information-centric networks based on the Content Centric<br />Networking (CCN) architecture. This attack aims at increasing the<br />content retrieval time. In this attack, both malicious consumers<br />and producers collude, by generating, publishing, and changing<br />content popularity. Malicious contents are stored by intermediate<br />nodes and occupy the cache space that should be occupied by<br />legitimate content. Thus, the probability of a legitimate consumer<br />retrieves content directly from the producer increases as well as<br />the content retrieval time. We evaluate the impact of the attack by<br />varying the number of consumers and producers in collusion, the<br />interest packets rate, and the way malicious contents are<br />requested. Results show if 20% of consumers are malicious and<br />send 500 interests/s each, the content retrieval time experienced by<br />legitimate users increases by 20 times, which shows the<br />effectiveness of the attack.</p>

2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


2021 ◽  
Vol 18 (4(Suppl.)) ◽  
pp. 1371
Author(s):  
Nasrina M Samir ◽  
Maisarah Musni ◽  
Zurina Mohd Hanapi ◽  
Mohamed Ridzal Radzuan

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.


Author(s):  
S. Lahdya ◽  
T. Mazri

Abstract. For the past twenty years, the automotive industry and research organizations have been aiming to put fully autonomous cars on the road. These cars which can be driven without the intervention of a driver, use several sensors and artificial intelligence technologies simultaneously, which allow them to detect the environment in order to merge the information obtained to analyze it, decide on an action, and to implement it. Thus, we are at the dawn of a revolution in the world of transport and mobility, which leads us to ensure the movement of the autonomous car in a safe manner. In this paper, we examine certain attacks on autonomous cars such as the denial of service attack, as well as the impact of these attacks on the last two levels of vehicle autonomy.


2021 ◽  
Author(s):  
Davi Alves

Bandwidth depletion Denial-of-Service (DoS) attack can impact the propagation of a mined block in the Bitcoin blockchain network. On Bitcoin Proof-of-Work (PoW) consensus several machines try to resolve an expensive cryptographic puzzle faster than anyone else and succeed to mine a valid block. Despite a DoS attack impedes one machine to propagate its mined block allowing it to become valid for most peers, there will be several other peers to resolve the puzzle in time, hence the blockchain will continue to grow. However, from the perspective of the owner of the attacked machine, this can be critical because it will not receive a mining reward. This chapter covers such an attack in the Lisk blockchain that utilizes the Delegated Proof of Stake (DPoS) consensus mechanism. A mitigation strategy was created based on two tools that I have created allowing a delegate account to be configured in more than one node, allowing to forge a block even when one of its nodes is under DoS attack. Also, the transaction flood DoS attack is explored, and a mitigation strategy was created for a specific sidechain in the Lisk ecosystem. The mitigation strategy identifies spam transactions and rejects them to be included on the Lisk nodes transaction pool, hence they will not be propagated into the blockchain. Towards the end, I evaluated scenarios and mitigation strategies created for each attack demonstrating solutions for several scenarios.


2020 ◽  
Vol 14 (1) ◽  
pp. 27-43
Author(s):  
Mainul Hasan ◽  
Amogh Venkatanarayan ◽  
Inder Mohan ◽  
Ninni Singh ◽  
Gunjan Chhabra

Denial of service attack is one of the most devastating and ruinous attacks on the internet. The attack can be performed by flooding the victim's machine with any kind of packets. Throughout all these years many methods have been proposed to reduce the impact, but with machines of higher capabilities coming in, the attack has also become more potent, and these proposals are either less effective or less efficient. A DoS attack exhausts the victim's resources affecting the availability of the resource. This paper will be comparing a few methods that have been proposed and published in various papers along with a newly proposed method. The comparison of the methods is done on a number of parameters including resource utilization, reaction time, worst case scenarios, etc. This paper also checks the viability of these methods over various layers of the network. Concluding with the best aspects of all the papers and the best among these for the current real conditions.


Sign in / Sign up

Export Citation Format

Share Document