A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture

Named-Data Networking (NDN) is the most promising architecture in the future Internet. NDN ensure high availability of contents and security of the data packet. However, it may disturb the stability and security in NDN routing such as Interest Flooding Attack (IFA). There are many existing detection...

全面介紹

Saved in:
書目詳細資料
Main Authors: Yu Beng Leau, Yong Jin Park, Joe H. Obit
格式: Article
語言:English
English
出版: 2020
在線閱讀:https://eprints.ums.edu.my/id/eprint/25451/1/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture.pdf
https://eprints.ums.edu.my/id/eprint/25451/2/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture%201.pdf
https://eprints.ums.edu.my/id/eprint/25451/
https://doi.org/10.1007/978-981-15-0058-9_70
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
id my.ums.eprints.25451
record_format eprints
spelling my.ums.eprints.254512020-05-28T02:36:33Z https://eprints.ums.edu.my/id/eprint/25451/ A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture Yu Beng Leau Yong Jin Park Joe H. Obit Named-Data Networking (NDN) is the most promising architecture in the future Internet. NDN ensure high availability of contents and security of the data packet. However, it may disturb the stability and security in NDN routing such as Interest Flooding Attack (IFA). There are many existing detection and mitigation technique about IFA which labelled a non-collusive type of routing threats where it causes the PIT resources to exhausted and legitimate request could not perform in communication. Unfortunately, all the existing counter-measure mechanism could not defend the Collusive Interest Flooding Attack (CIFA). The attacks initiated with a satisfying interest and malicious data producer will reply to the corresponding request before the expiry of existing PIT entries in NDN router along the path. CIFA is classified as low rate intermittent attack which is very difficult in distinguish with legitimate requests. Thus, CIFA is more vulnerable and threatens than previous NCIFA. Moreover, there is no benchmark datasets or any public datasets to perform further experiments on detecting CIFA. Thus, there is a need to produce reliable datasets for future investigation in detection or mitigation relevant attacks in NDN. 2020 Article PeerReviewed text en https://eprints.ums.edu.my/id/eprint/25451/1/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture.pdf text en https://eprints.ums.edu.my/id/eprint/25451/2/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture%201.pdf Yu Beng Leau and Yong Jin Park and Joe H. Obit (2020) A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture. Computational Science and Technology, 603. pp. 481-490. https://doi.org/10.1007/978-981-15-0058-9_70
institution Universiti Malaysia Sabah
building UMS Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sabah
content_source UMS Institutional Repository
url_provider http://eprints.ums.edu.my/
language English
English
description Named-Data Networking (NDN) is the most promising architecture in the future Internet. NDN ensure high availability of contents and security of the data packet. However, it may disturb the stability and security in NDN routing such as Interest Flooding Attack (IFA). There are many existing detection and mitigation technique about IFA which labelled a non-collusive type of routing threats where it causes the PIT resources to exhausted and legitimate request could not perform in communication. Unfortunately, all the existing counter-measure mechanism could not defend the Collusive Interest Flooding Attack (CIFA). The attacks initiated with a satisfying interest and malicious data producer will reply to the corresponding request before the expiry of existing PIT entries in NDN router along the path. CIFA is classified as low rate intermittent attack which is very difficult in distinguish with legitimate requests. Thus, CIFA is more vulnerable and threatens than previous NCIFA. Moreover, there is no benchmark datasets or any public datasets to perform further experiments on detecting CIFA. Thus, there is a need to produce reliable datasets for future investigation in detection or mitigation relevant attacks in NDN.
format Article
author Yu Beng Leau
Yong Jin Park
Joe H. Obit
spellingShingle Yu Beng Leau
Yong Jin Park
Joe H. Obit
A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture
author_facet Yu Beng Leau
Yong Jin Park
Joe H. Obit
author_sort Yu Beng Leau
title A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture
title_short A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture
title_full A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture
title_fullStr A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture
title_full_unstemmed A Perspective Towards NCIFA and CIFA in Named-Data Networking Architecture
title_sort perspective towards ncifa and cifa in named-data networking architecture
publishDate 2020
url https://eprints.ums.edu.my/id/eprint/25451/1/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture.pdf
https://eprints.ums.edu.my/id/eprint/25451/2/A%20Perspective%20Towards%20NCIFA%20and%20CIFA%20in%20Named-Data%20Networking%20Architecture%201.pdf
https://eprints.ums.edu.my/id/eprint/25451/
https://doi.org/10.1007/978-981-15-0058-9_70
_version_ 1760230369695629312
score 13.251813