A Triggered Delay-based Approach against Cache Privacy Attack in NDN

被引:3
|
作者
Kumar, Naveen [1 ]
Singh, Ashutosh Kumar [1 ]
Srivastava, Shashank [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Dept Comp Sci & Engn, Allahabad 211004, Uttar Pradesh, India
关键词
Cache Privacy Attack; CPA; Named Data Networking; NDN;
D O I
10.2991/ijndc.2018.3.6.5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.
引用
收藏
页码:174 / 184
页数:11
相关论文
共 50 条
  • [1] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Naveen Kumar
    Ashutosh Kumar Singh
    Shashank Srivastava
    [J]. International Journal of Networked and Distributed Computing, 2018, 6 (3) : 174 - 184
  • [2] A Proactive Cache Privacy Attack on NDN
    Compagno, Alberto
    Conti, Mauro
    Losiouk, Eleonora
    Tsudik, Gene
    Valle, Sebastiano
    [J]. NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [3] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Kumar, Naveen
    Srivastava, Shashank
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3241 - 3251
  • [4] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Naveen Kumar
    Shashank Srivastava
    [J]. Arabian Journal for Science and Engineering, 2024, 49 : 3241 - 3251
  • [5] Gini impurity based NDN cache pollution attack defence mechanism
    Singh, Vishwa Pratap
    Ujjwal, R. L.
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2020, 41 (06): : 1353 - 1363
  • [6] A delay-based approach for TCP parallelization
    Fu, Q
    Indulska, J
    [J]. 2005 NEXT GENERATION INTERNET NETWORKS, 2005, : 302 - 309
  • [7] Towards Attack Resilient Delay-Based Strong PUFs
    Wisiol, Nils
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 5 - 8
  • [8] A Delay-Based Machine Learning Model for DMA Attack Mitigation
    Gui, Yutian
    Bhure, Chaitanya
    Hughes, Marcus
    Saqib, Fareena
    [J]. CRYPTOGRAPHY, 2021, 5 (03)
  • [9] A Lightweight Delay-based Authentication Scheme for DMA Attack Mitigation
    Gui, Yutian
    Siddiqui, Ali Shuja
    Nicholas, Geraldine Shirley
    Hughes, Marcus
    Saqib, Fareena
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 263 - 268
  • [10] Chirp Group Delay-Based Onset Detection in Instruments with Fast Attack
    Joysingh, S. Johanan
    Vijayalakshmi, P.
    Nagarajan, T.
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2022, 42 (3) : 1639 - 1662