Detecting and mitigating interest flooding attacks in content-centric network

被引:24
作者
Wang, Kai [1 ]
Zhou, Huachun [1 ]
Luo, Hongbin [1 ]
Guan, Jianfeng [2 ]
Qin, Yajuan [1 ]
Zhang, Hongke [1 ,2 ]
机构
[1] Beijing Jiaotong Univ, Beijing 100044, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
content-centric network; interest flooding attacks; DoS against content source; threshold; detection; mitigation; security;
D O I
10.1002/sec.770
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The original architecture of content-centric network (CCN) may suffer from interest flooding attacks. In this paper, we focus on one type of interest flooding attacks called denial of service against content source (DACS attack). To damage CCN, it floods a large number of malicious interests requesting content that does not exist, which guarantees that no cache hit can occur at routers until these malicious interests reach the target content source. Thus, it can directly exhaust the resource of the victim. To counter it, we propose a threshold-based detecting and mitigating (TDM) scheme. The basic idea is to detect DACS attack on the basis of the frequency that pending interest table items in CCN routers expire (recording this frequency by introducing two counters with their corresponding thresholds and one indicator for counter mode) and to mitigate it by implementing the rate limiter in each router. From the viewpoint of a CCN router, we analyze the performance of TDM in terms of detection ability and effect on mitigating malicious traffic. In addition, we briefly analyze the overhead of TDM. The results show that TDM achieves high detection ability and good effect on mitigating malicious traffic while bringing in small overhead on countering DACS attack. To the best of our knowledge, this is the first attempt to design a detailed scheme embedded with corresponding algorithms on countering this attack. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:685 / 699
页数:15
相关论文
共 17 条
[1]  
[Anonymous], 2010, NDN0001 PARC
[2]  
[Anonymous], P ACM SIGCOMM WORKSH
[3]   Analyzing well-known countermeasures against distributed denial of service attacks [J].
Beitollahi, Hakem ;
Deconinck, Geert .
COMPUTER COMMUNICATIONS, 2012, 35 (11) :1312-1332
[4]  
Boteanu D, 2007, LECT NOTES COMPUT SC, V4779, P263
[5]  
Cho K, 2012, P IEEE INFOCOM EM DE
[6]   A critical look at power law modelling of the Internet [J].
Clegg, Richard G. ;
Di Cairano-Gilfedder, Carla ;
Zhou, Shi .
COMPUTER COMMUNICATIONS, 2010, 33 (03) :259-268
[7]   A decade of Internet research - advances in models and practices [J].
Di Cairano-Gilfedder, C ;
Clegg, RG .
BT TECHNOLOGY JOURNAL, 2005, 23 (04) :115-128
[8]  
Eum Suyong, 2012, P ACM SIGCOMM WORKSH
[9]  
Gasti P, 2012, 1208 ARXIVE
[10]  
Ghodsi A, 2011, P AM SIGCOMM WORKSH