Reference : Advanced Interest Flooding Attacks in Named-Data Networking
Scientific congresses, symposiums and conference proceedings : Unpublished conference
Engineering, computing & technology : Computer science
Computational Sciences
http://hdl.handle.net/10993/32632
Advanced Interest Flooding Attacks in Named-Data Networking
English
Signorello, Salvatore mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Marchal, Samuel mailto [Aalto University > Department of Computer Science > Secure Systems Research Group > Postdoctoral Researcher]
François, Jérôme mailto [INRIA Nancy - Grand Est > > Madynes research group > Research scientist]
Festor, Olivier mailto [INRIA Nancy - Grand Est > > Madynes research group > Professor]
State, Radu mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
30-Oct-2017
10
Yes
International
The 16th IEEE International Symposium on Network Computing and Applications (NCA 2017)
from 30-10-2017 to 01-11-2017
Cambridge, MA
USA
[en] Infomation-Centric Networking ; Denial Of Service ; Interest Flooding Attack ; Named-Data Networking ; security ; computer networks ; future Internet architectures
[en] The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN’s data-plane seems to offer many advantages, e.g., native support for multicast communications and flow balance, it also makes the network infrastructure vulnerable to a specific DDoS attack, the Interest Flooding Attack (IFA). In IFAs, a botnet issuing unsatisfiable content requests can be set up effortlessly to exhaust routers’ resources and cause a severe performance drop to legitimate users. So far several countermeasures have addressed this security threat, however, their efficacy was proved by means of simplistic assumptions on the attack model. Therefore, we propose a more complete attack model and design an advanced IFA. We show the efficiency of our novel attack scheme by extensively assessing some of the state-of-the-art countermeasures. Further, we release the software to perform this attack as open source tool to help design future more robust defense mechanisms.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Services and Data management research group (SEDAN)
Fonds National de la Recherche - FnR
Researchers ; Students
http://hdl.handle.net/10993/32632
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
FnR ; FNR6450335 > Thomas Engel > IDSECOM > Id-Based Secure Communications System For Unified Access In Iot > 01/04/2014 > 31/03/2017 > 2013

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
PersonalVersion.pdfAuthor preprint1.45 MBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.