Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Conti, Paolo Gasti, M. Teoli (2013)
A lightweight mechanism for detection of cache pollution attacks in Named Data NetworkingComput. Networks, 57
Cesar Ghali, G. Tsudik, E. Uzun (2014)
Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking
(2010)
CCNx access control specications
Cesar Ghali, Marc Schlosberg, G. Tsudik, Christopher Wood (2015)
Interest-Based Access Control for Content Centric NetworksProceedings of the 2nd ACM Conference on Information-Centric Networking
J. Mirkovic, P. Reiher (2005)
D-WARD: a source-end defense against flooding denial-of-service attacksIEEE Transactions on Dependable and Secure Computing, 2
Liming Lu, M. Chan, E. Chang (2008)
A general model of probabilistic packet marking for IP traceback
R. Tourani, S. Misra, Travis Mick, Gaurav Panwar (2016)
Security, Privacy, and Access Control in Information-Centric Networking: A SurveyIEEE Communications Surveys & Tutorials, 20
L. Breslau, P. Cao, Li Fan, Graham Phillips, S. Shenker (1999)
Web caching and Zipf-like distributions: evidence and implicationsIEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1
F. Almeida, Justino Lourenço (2012)
Information Centric Networks - Design Issues, Principles and Approaches, 3
Aziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim (2013)
Protecting access privacy of cached contents in information centric networks
M Vahlenkamp, M Wählisch, TC Schmidt (2013)
Backscatter from the data plane—threats to stability and security in information‐centric networking, 57
Eslam AbdAllah, H. Hassanein, Mohammad Zulkernine (2015)
A Survey of Security Attacks in Information-Centric NetworkingIEEE Communications Surveys & Tutorials, 17
Traces available in the Internet traffic archive
S. Arianfar, Teemu Koponen, B. Raghavan, S. Shenker (2011)
On preserving privacy in content-oriented networks
G. Xylomenos, C. Ververidis, V. Siris, N. Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, K. Katsaros, George Polyzos (2014)
A Survey of Information-Centric Networking ResearchIEEE Communications Surveys & Tutorials, 16
Mengjun Xie, I. Widjaja, Haining Wang (2012)
Enhancing cache robustness for content-centric networking2012 Proceedings IEEE INFOCOM
Mahdi Aiash, J. Loo (2015)
An integrated authentication and authorization approach for the network of information architectureJ. Netw. Comput. Appl., 50
Alberto Compagno, M. Conti, Paolo Gasti, G. Tsudik (2013)
Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking38th Annual IEEE Conference on Local Computer Networks
Mihaela Ion, Jianqing Zhang, E. Schooler (2013)
Toward content-centric privacy in ICN: attribute-based encryption and routingProceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Yonghua You, Mohammad Zulkernine, A. Haque (2008)
A Distributed Defense Framework for Flooding-Based DDoS Attacks2008 Third International Conference on Availability, Reliability and Security
Cheng Yi, A. Afanasyev, I. Moiseenko, Lan Wang, Beichuan Zhang, Lixia Zhang (2013)
A case for stateful forwarding planeComput. Commun., 36
Jianli Pan, S. Paul, R. Jain (2011)
A survey of the research on future internet architecturesIEEE Communications Magazine, 49
Jian Yuan, K. Mills (2005)
Monitoring the macroscopic effect of DDoS flooding attacksIEEE Transactions on Dependable and Secure Computing, 2
B. Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, B. Ohlman (2012)
INFORMATION-CENTRIC NETWORKING
Erik Kline, A. Afanasyev, P. Reiher (2011)
Shield: DoS filtering using traffic deflecting2011 19th IEEE International Conference on Network Protocols
Christopher Wood, E. Uzun (2014)
Flexible end-to-end content security in CCN2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)
R. Iyer (2005)
Editorial: State of the Journal AddressIEEE Trans. Dependable Secur. Comput., 2
Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim (2015)
Timing Attacks on Access Privacy in Information Centric Networks and CountermeasuresIEEE Transactions on Dependable and Secure Computing, 12
A. Afanasyev, Priya Mahadevan, I. Moiseenko, E. Uzun, Lixia Zhang (2013)
Interest flooding attack and countermeasures in Named Data Networking2013 IFIP Networking Conference
B. Ahlgren, Christian Dannewitz, Claudio Imbrenda, D. Kutscher, B. Ohlman (2012)
A survey of information-centric networkingIEEE Communications Magazine, 50
Hua Guo, Xiao Wu, Y. Zhang, Yi Chen, Xi Xu (2007)
Injection of Thermoplastic Polyurethane to Fix Diamond Beads on Wire SawsKey Engineering Materials, 359-360
Yoohwan Kim, W. Lau, M. Chuah, H. Chao (2006)
PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacksIEEE Transactions on Dependable and Secure Computing, 3
R. Rembarz, D. Catrein, J. Sachs (2009)
Private Domains in Networks of Information2009 IEEE International Conference on Communications Workshops
S. Misra, R. Tourani, N. Majd (2013)
Secure content delivery in information-centric networks: design, implementation, and analyses
DoS & DDoS in nameddata networking
N. Fotiou, G. Marias, George Polyzos (2012)
Access control enforcement delegation for information-centric networking architectures
Matthias Wählisch, T. Schmidt, M. Vahlenkamp (2012)
Backscatter from the data plane - Threats to stability and security in information-centric network infrastructureArXiv, abs/1205.4778
S. Misra, R. Tourani, Francisco Natividad, Travis Mick, N. Majd, Hong Huang (2016)
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in ICNsArXiv, abs/1603.03501
Eslam AbdAllah, Mohammad Zulkernine, H. Hassanein (2015)
Detection and Prevention of Malicious Requests in ICN Routing and Caching2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
Chaabane Abdelberi, Emiliano Cristofaro, M. Kâafar, E. Uzun (2012)
Privacy in content-oriented networking: threats and countermeasuresArXiv, abs/1211.5183
Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin (2009)
DepenDNS: Dependable Mechanism against DNS Cache Poisoning
Lei Guo, Enhua Tan, Songqing Chen, Zhen Xiao, Xiaodong Zhang (2007)
Does internet media traffic really follow Zipf-like distribution?
Eslam AbdAllah, Mohammad Zulkernine, H. Hassanein (2014)
Countermeasures for Mitigating ICN Routing Related DDoS Attacks
Jun Kurihara, E. Uzun, Christopher Wood (2015)
An encryption-based access control framework for content-centric networking2015 IFIP Networking Conference (IFIP Networking)
A Ghodsi, T Koponen, B Raghavan, S Shenker, A Singla, J Wilcox (2011)
Proc. of the 10th ACM Workshop on Hot Topics in Networks
Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang (2013)
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network SystemsIEEE Transactions on Dependable and Secure Computing, 10
How to cite this article: AbdAllah EG, Zulkernine M, Hassanein HS. DADI: Defending against distributed denial of service in information-centric networking routing and caching
(2012)
ndnSIM: NDN simulator for NS-3
Jiong Zhang, Mohammad Zulkernine (2006)
Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection2006 IEEE International Conference on Communications, 5
Yu Wang, Mingwei Xu, Zhenyang Feng, Qing Li, Qi Li (2014)
Session-based access control in information-centric networks: Design and analyses2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)
N. Fotiou, G. Marias, George Polyzos (2010)
Fighting spam in publish/subscribe networks using information ranking6th EURO-NGI Conference on Next Generation Internet
Travis Mick, R. Tourani, S. Misra (2016)
MuNCC: Multi-hop Neighborhood Collaborative Caching in Information Centric NetworksProceedings of the 3rd ACM Conference on Information-Centric Networking
Xiaowei Yang, D. Wetherall, T. Anderson (2005)
A DoS-limiting network architecture
Information‐centric networking (ICN) is a new communication paradigm for the upcoming next‐generation internet (NGI). ICN is an open environment that depends on in‐network caching and focuses on contents. These attributes make ICN architectures subject to different types of routing and caching attacks. An attacker publishes invalid contents or announces malicious routes and sends malicious requests for available and unavailable contents. These types of attacks can cause distributed denial of service (DDoS) and cache pollution in ICN architectures. In this paper,we propose a Defending solution Against DDoS in ICN routing and caching (DADI) that detects and prevents these DDoS attacks. This solution allows ICN routers to differentiate between legitimate and attack behaviors in the detection phase based on threshold values. In the prevention phase, ICN routers are able to take actions against these attacks. In our experiments, we measure satisfied requests for legitimate users and cache hit ratio for ICN routers, which are evaluated over different scenarios when there are 20%, 50%, and 80% attackers with respect to legitimate users. The experiments show that the proposed solution effectively mitigates routing‐ and caching‐related DDoS attacks in ICN and enhances ICN performance in the existence of DDoS attacks.
Security and Privacy – Wiley
Published: Mar 1, 2018
Keywords: ; ;
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.