A Detection and Defense Approach for Content Privacy in Named Data Network

被引:2
|
作者
Dogruluk, Ertugrul [1 ]
Costa, Antonio [1 ]
Macedo, Joaquim [1 ]
机构
[1] Univ Minho, Ctr Algoritmi, Braga, Portugal
关键词
NDN; content privacy; side-channel timing attack; attack detection;
D O I
10.1109/ntms.2019.8763835
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Named Data Network (NDN) is a promising network paradigm for content distribution based on caching. However, it may put consumer privacy at risk, as the adversary may identify the content, the name and the signature (namely a certificate) through side-channel timing responses from the cache of the routers. The adversary may identify the content name and the consumer node by distinguishing between cached and uncached contents. In order to mitigate the timing attack, effective countermeasure methods have been proposed by other authors, such as random caching, random freshness, and probabilistic caching. In this work, we have implemented a timing attack scenario to evaluate the efficiency of these countermeasures and to demonstrate how the adversary can be detected. For this goal, a brute force timing attack scenario based on a real topology was developed, which is the first brute force attack model applied in NDN. Results show that the adversary nodes can be effectively distinguished from other legitimate consumers during the attack period. It is also proposed a multi-level mechanism to detect an adversary node. Through this approach, the content distribution performance can be mitigated against the attack.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] An improved Approach to Privacy Data Protection in the Body Area Network
    Wang, Wei-Xing
    Ye, Liuqin
    Proceedings of SPIE - The International Society for Optical Engineering, 2023, 12604
  • [32] Detection and defense of network virus using data mining technology
    Li, Zhijun
    Jiang, Xuedong
    SECURITY AND PRIVACY, 2021, 4 (06)
  • [33] VENDNET: VEhicular Named Data NETwork
    Chen, Min
    Mau, Dung Ong
    Zhang, Yin
    Taleb, Tarik
    Leung, Victor C. M.
    VEHICULAR COMMUNICATIONS, 2014, 1 (04) : 208 - 213
  • [34] Fast content verification for named data networking
    Wang, Yi
    Liu, Bin
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 : 234 - 242
  • [35] A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures
    Dogruluk, Ertugrul
    Macedo, Joaquim
    Costa, Antonio
    ELECTRONICS, 2022, 11 (08)
  • [36] A Named Entity Recognition Based Approach for Privacy Requirements Engineering
    Herwanto, Guntur Budi
    Quirchmayr, Gerald
    Tjoa, A. Min
    29TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2021), 2021, : 406 - 411
  • [37] A Privacy Protection Method for Social Network Data against Content/Degree Attacks
    Sung, Min Kyoung
    Lee, Ki Yong
    Shin, Jun-Bum
    Chung, Yon Dohn
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 152 - 160
  • [38] Efficient Data Delivery in Content-Centric Network with Stronger Privacy of Publisher
    Youn, Taek-Young
    Kim, Joongheon
    Seo, Seog Chung
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 511 - 513
  • [39] Privacy Risks in Named Data Networking: What is the Cost of Performance?
    Lauinger, Tobias
    Laoutaris, Nikolaos
    Rodriguez, Pablo
    Strufe, Thorsten
    Biersack, Ernst
    Kirda, Engin
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (05) : 54 - 57
  • [40] Security and Privacy Issues in Vehicular Named Data Networks: An Overview
    Khelifi, Hakima
    Luo, Senlin
    Nour, Boubakr
    Shah, Sayed Chhattan
    MOBILE INFORMATION SYSTEMS, 2018, 2018