scispace - formally typeset
Journal ArticleDOI

Gini impurity based NDN cache pollution attack defence mechanism

Vishwa Pratap Singh, +1 more
- 08 Sep 2020 - 
- Vol. 41, Iss: 6, pp 1353-1363
Reads0
Chats0
TLDR
Monitor metrics for quantitative anomaly detection of requests are introduced and a scheme based on Gini Impurity to detect network under cache pollution attack is proposed and an Interest throttling mechanism based on trust to reinforce network under Cache pollution attacks are proposed.
Abstract
Name Data Network (NDN) is a futuristic Internet architecture that delivers content based on strategically chosen names and caches content on intermediate routers in the content-delivery path, whic...

read more

Citations
More filters
Book ChapterDOI

NDN Content Poisoning Attack Mitigation Using Fuzzy-Reputation Based Trust

TL;DR: An outline of reputation-based trust approaches is offered, their architecture tradeoffs are addressed, and it is concluded that by operating in addition to current credential-based systems.
References
More filters
Proceedings ArticleDOI

Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking

TL;DR: A ranking algorithm for cached content that allows routers to distinguish good and (likely) bad content is proposed, based on statistics collected from consumers' actions following delivery of content objects.
Proceedings ArticleDOI

Enhancing cache robustness for content-centric networking

TL;DR: CacheShield can effectively improve cache performance under normal circumstances, and more importantly, shield CCN routers from cache pollution attacks, and is effective for both CCN and today's cache servers.
Journal ArticleDOI

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

TL;DR: This paper focuses on cache pollution attacks, where the adversary's goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers, and illustrates that existing proactive countermeasures are ineffective against realistic adversaries.
Journal ArticleDOI

A Gini Impurity-Based Interest Flooding Attack Defence Mechanism in NDN

TL;DR: The simulation results validate that the Gini impurity-based IFA detection mechanism can accurately detect and effectively mitigate IFAs, and the performance of the mechanism is evaluated.
Proceedings ArticleDOI

Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment

TL;DR: This paper proposes three realistic attack scenarios relying on both protocol design and implementation weaknesses and analyzes their impact on the different ICN nodes composing a realistic topology.
Related Papers (5)