A Triggered Delay-based Approach against Cache Privacy Attack in NDN

被引:0
|
作者
Naveen Kumar
Ashutosh Kumar Singh
Shashank Srivastava
机构
[1] Motilal Nehru National Institute of Technology Allahabad,Department of Computer Science & Engineering
关键词
Cache Privacy Attack; CPA; Named Data Networking; NDN;
D O I
10.2991/ijndc.2018.6.3.5
中图分类号
学科分类号
摘要
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.
引用
收藏
页码:174 / 184
页数:10
相关论文
共 50 条
  • [1] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Srivastava, Shashank
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2018, 6 (03) : 174 - 184
  • [2] A Proactive Cache Privacy Attack on NDN
    Compagno, Alberto
    Conti, Mauro
    Losiouk, Eleonora
    Tsudik, Gene
    Valle, Sebastiano
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [3] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Kumar, Naveen
    Srivastava, Shashank
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3241 - 3251
  • [4] IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
    Naveen Kumar
    Shashank Srivastava
    Arabian Journal for Science and Engineering, 2024, 49 : 3241 - 3251
  • [5] Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution Attack
    Hidouri, Abdelhak
    Touati, Haifa
    Hadded, Mohamed
    Hajlaoui, Nasreddine
    Muhlethaler, Paul
    Bouzefrane, Samia
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1564 - 1569
  • [6] Gini impurity based NDN cache pollution attack defence mechanism
    Singh, Vishwa Pratap
    Ujjwal, R. L.
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2020, 41 (06): : 1353 - 1363
  • [7] Towards Attack Resilient Delay-Based Strong PUFs
    Wisiol, Nils
    2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 5 - 8
  • [8] A delay-based approach for TCP parallelization
    Fu, Q
    Indulska, J
    2005 NEXT GENERATION INTERNET NETWORKS, 2005, : 302 - 309
  • [9] A Delay-Based Machine Learning Model for DMA Attack Mitigation
    Gui, Yutian
    Bhure, Chaitanya
    Hughes, Marcus
    Saqib, Fareena
    CRYPTOGRAPHY, 2021, 5 (03)
  • [10] A Lightweight Delay-based Authentication Scheme for DMA Attack Mitigation
    Gui, Yutian
    Siddiqui, Ali Shuja
    Nicholas, Geraldine Shirley
    Hughes, Marcus
    Saqib, Fareena
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 263 - 268