A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture
Named-Data Networking (NDN) is the most promising architecture in the future Internet. NDN ensure high availability of contents and security of the data packet. However, it may disturb the stability and security in NDN routing such as Interest Flooding Attack (IFA). There are many existing detection...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
2020
|
Online Access: | https://eprints.ums.edu.my/id/eprint/25451/1/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture.pdf https://eprints.ums.edu.my/id/eprint/25451/2/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture%201.pdf https://eprints.ums.edu.my/id/eprint/25451/ https://doi.org/10.1007/978-981-15-0058-9_70 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Named-Data Networking (NDN) is the most promising architecture in the future Internet. NDN ensure high availability of contents and security of the data packet. However, it may disturb the stability and security in NDN routing such as Interest Flooding Attack (IFA). There are many existing detection and mitigation technique about IFA which labelled a non-collusive type of routing threats where it causes the PIT resources to exhausted and legitimate request could not perform in communication. Unfortunately, all the existing counter-measure mechanism could not defend the Collusive Interest Flooding Attack (CIFA). The attacks initiated with a satisfying interest and malicious data producer will reply to the corresponding request before the expiry of existing PIT entries in NDN router along the path. CIFA is classified as low rate intermittent attack which is very difficult in distinguish with legitimate requests. Thus, CIFA is more vulnerable and threatens than previous NCIFA. Moreover, there is no benchmark datasets or any public datasets to perform further experiments on detecting CIFA. Thus, there is a need to produce reliable datasets for future investigation in detection or mitigation relevant attacks in NDN. |
---|