0
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Detection of malicious consumer interest packet with dynamic threshold values

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequently isolates the legitimate content in the network. In the past, several efforts have been made to propose the mitigation strategies for the content poisoning attack, but to the best of our knowledge, no specific work has been done to address an emerging attack-surface in NDN, which we call an interest flooding attack. Handling this attack-surface can potentially make content poisoning attack mitigation schemes more effective, secure, and robust. Hence, in this article, we propose the addition of a security mechanism in the CPA mitigation scheme that is, Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe, in which we block the malicious face of compromised consumers by monitoring the Cache-Miss Ratio values and the Queue Capacity at the Edge Routers. The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification overhead at the NDN Routers.

          Related collections

          Most cited references26

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Networking named content

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A survey of information-centric networking

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Measuring ISP Topologies With Rocketfuel

                Bookmark

                Author and article information

                Contributors
                Journal
                PeerJ Comput Sci
                PeerJ Comput Sci
                peerj-cs
                peerj-cs
                PeerJ Computer Science
                PeerJ Inc. (San Diego, USA )
                2376-5992
                17 March 2021
                2021
                : 7
                : e435
                Affiliations
                [1 ]Computer Science, Capital University of Science and Technology , Islamabad, Pakistan
                [2 ]College of Engineering and IT, Ajman University , Ajman, United Arab Emirates
                [3 ]James Watt School of Engineering, University of Glasgow , Glasgow, UK
                Author information
                http://orcid.org/0000-0001-6926-7983
                Article
                cs-435
                10.7717/peerj-cs.435
                8022593
                4b1b7d8b-5924-4fa4-a940-1aff01265843
                © 2021 Qureshi et al.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 6 November 2020
                : 17 February 2021
                Funding
                The authors received no funding for this work.
                Categories
                Computer Networks and Communications
                Emerging Technologies
                Security and Privacy

                content poisoning attacks,named data networking,malicious consumer interest packet,mitigation techniques,dynamic threshold

                Comments

                Comment on this article