A Detection and Defense Approach for Content Privacy in Named Data Network

被引:2
|
作者
Dogruluk, Ertugrul [1 ]
Costa, Antonio [1 ]
Macedo, Joaquim [1 ]
机构
[1] Univ Minho, Ctr Algoritmi, Braga, Portugal
关键词
NDN; content privacy; side-channel timing attack; attack detection;
D O I
10.1109/ntms.2019.8763835
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Named Data Network (NDN) is a promising network paradigm for content distribution based on caching. However, it may put consumer privacy at risk, as the adversary may identify the content, the name and the signature (namely a certificate) through side-channel timing responses from the cache of the routers. The adversary may identify the content name and the consumer node by distinguishing between cached and uncached contents. In order to mitigate the timing attack, effective countermeasure methods have been proposed by other authors, such as random caching, random freshness, and probabilistic caching. In this work, we have implemented a timing attack scenario to evaluate the efficiency of these countermeasures and to demonstrate how the adversary can be detected. For this goal, a brute force timing attack scenario based on a real topology was developed, which is the first brute force attack model applied in NDN. Results show that the adversary nodes can be effectively distinguished from other legitimate consumers during the attack period. It is also proposed a multi-level mechanism to detect an adversary node. Through this approach, the content distribution performance can be mitigated against the attack.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A Hybrid Coordination Approach of In-network Caching for Named Data Networking
    Chang, Chih Yen
    Chang, Ming Sang
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (04): : 285 - 299
  • [22] A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking
    Magsi, Arif Hussain
    Yovita, Leanna Vidya
    Ghulam, Ali
    Muhammad, Ghulam
    Ali, Zulfiqar
    SUSTAINABILITY, 2023, 15 (14)
  • [23] In Defense of Data: Information and the Costs of Privacy
    Lenard, Thomas M.
    Rubin, Paul H.
    POLICY AND INTERNET, 2010, 2 (01): : 149 - 183
  • [24] GCPiN: Group Caching for Privacy in Named Data Networking
    Kamath, Amita Ajith
    Jamadagni, Chirag
    Anilkumar, Abhijith
    Mathew, Kevin
    Tahiliani, Mohit P.
    2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [25] Protecting Router Cache Privacy in Named Data Networking
    Gao, Manfei
    Zhu, Xiaoyan
    Su, Yang
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [26] Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks
    Wang, Hanbo
    Man, Dapeng
    Han, Shuai
    Wang, Huanran
    Yang, Wu
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 545 - 556
  • [27] Privacy -preserving Network Anomaly Detection on Homomorphically Encrypted Data
    Wingarz, Tatjana
    See, August
    Gondesent, Florian
    Fischer, Mathias
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [28] An in-network collaborative verification mechanism for defending content poisoning in Named Data Networking
    Kang, Haohao
    Zhu, Yi
    Tao, Yu
    Yang, Jianlong
    PROCEEDINGS OF 2018 1ST IEEE INTERNATIONAL CONFERENCE ON HOT INFORMATION-CENTRIC NETWORKING (HOTICN 2018), 2018, : 46 - 50
  • [29] An Enhanced Approach to Preserving Privacy in Social Network Data Publishing
    Bensimessaoud, Sihem
    Benmeziane, Souad
    Badache, Nadjib
    Djellalbia, Amina
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 80 - 85
  • [30] Privacy Preserving Approach in Dynamic Social Network Data Publishing
    Macwan, Kamalkumar
    Patel, Sankita
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 381 - 398