A Triggered Delay-based Approach against Cache Privacy Attack in NDN

被引:0
|
作者
Naveen Kumar
Ashutosh Kumar Singh
Shashank Srivastava
机构
[1] Motilal Nehru National Institute of Technology Allahabad,Department of Computer Science & Engineering
关键词
Cache Privacy Attack; CPA; Named Data Networking; NDN;
D O I
10.2991/ijndc.2018.6.3.5
中图分类号
学科分类号
摘要
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.
引用
收藏
页码:174 / 184
页数:10
相关论文
共 50 条
  • [21] A Digital and Lightweight Delay-based Detector against Fault Injection Attacks
    Zhang, Maoshen
    Liu, Qiang
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [22] Shall I post this now? Optimized, delay-based privacy protection in social networks
    Parra-Arnau, Javier
    Gomez Marmol, Felix
    Rebollo-Monedero, David
    Forne, Jordi
    KNOWLEDGE AND INFORMATION SYSTEMS, 2017, 52 (01) : 113 - 145
  • [23] Shall I post this now? Optimized, delay-based privacy protection in social networks
    Javier Parra-Arnau
    Félix Gómez Mármol
    David Rebollo-Monedero
    Jordi Forné
    Knowledge and Information Systems, 2017, 52 : 113 - 145
  • [24] A Delay-Based Deep Learning Approach for Urban Traffic Volume Prediction
    Tao, Yanjie
    Sun, Peng
    Boukerche, Azzedine
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [25] Alcohol and the Oculomotor Neural Circuit : System Identification, a Delay-Based Approach
    du Plessis, Willem
    van Vuuren, Pieter
    van Schoor, George
    2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015), 2015, : 261 - 264
  • [26] Request Delay-Based Pricing for Proactive Caching: A Stackelberg Game Approach
    Huang, Wei
    Chen, Wei
    Poor, H. Vincent
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (06) : 2903 - 2918
  • [27] Difference timing attack against AES based on cache timing character
    Deng, Gaoming
    Zhang, Peng
    Zhao, Qiang
    Liu, Xiaoqin
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2008, 33 (10): : 1088 - 1091
  • [28] AN ANALYTICAL APPROACH TO TUNING OF DELAY-BASED CONTROLLERS FOR LTI-SISO SYSTEMS
    Ramirez, Adrian
    Sipahi, Rifat
    Mondie, Sabine
    Garrido, Ruben
    SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 2017, 55 (01) : 397 - 412
  • [29] A Systematic Approach for Internal Entropy Boosting in Delay-based RO PUF on an FPGA
    Aguirre, Abby
    Hall, Michael
    Lim, Timothy
    Trinh, Jonathan
    Yan, Wei
    Tehranipoor, Fatemeh
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 623 - 626
  • [30] Evaluation of Communication Delay Based Attack Against the Smart Grid
    De Pace, Gabriel
    Wang, Zhenhua
    Benin, Joseph
    He, Haibo
    Sun, Yan
    2020 IEEE KANSAS POWER AND ENERGY CONFERENCE (KPEC), 2020,