Skip to main content
Log in

Cooperative-Filter: countering Interest flooding attacks in named data networking

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Named data networking (NDN) is an emerging networking paradigm that is considered as one of the promising candidates for next-generation Internet architecture. To be a viable Internet architecture, NDN must be resilient against current and emerging threats. This paper focuses on how to detect and mitigate the Interest flooding attack (IFA) in NDN, which can excessively consume the resource of each involved router by flooding too many malicious Interest packets with fake names. In this paper, to counter IFA, an architecture called Cooperative-Filter is proposed. It detects IFA using fuzzy logic, and mitigates it based on the cooperation between routers at the granularity of per-prefix-per-interface, by taking advantages of the state statistics of each router. Moreover, the performance of Cooperative-Filter is evaluated, based on both effect of it on reducing memory resource consumption of each involved router and the effect on increasing Interest satisfaction rate for legitimate users when suffering IFA as well as on decreasing the Interest-retrieving delay. Simulation results demonstrate that Cooperative-Filter can detect IFA and effectively mitigate its damage effect on NDN. To the best of our knowledge, this is the first attempt to design an IFA countermeasure embedding with fuzzy logic as well as countering IFA at the granularity of per-prefix-per-interface.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Afanasyev A, Moiseenko I, Zhang L (2012) ndnSIM: NDN simulator for NS-3. NDN. Technical, Report NDN-0005

  • Afanasyev A, Mahadevan P, Uzun E, Zhang L (2013) Interest flooding attack and countermeasures in named data networking. In: Proceedings of IFIP networking

  • Carofiglio G, Muscariello L, Gallo M (2011a) Bandwidth and storage sharing performance in information centric networking. In: Proceedings of the ACM SIGCOMM workshop on information-centric networking (ICN)

  • Carofiglio G, Gallo M, Muscariello L, Perino D (2011b) Modeling data transfer in content centric networking. In: Proceedings of the 23rd international teletraffic congress

  • Carofiglio G, Gallo M, Muscariello L, Perino D (2011c) Modeling data transfer in content centric networking(extended version). In Technical Report. http://perso.rd.francetelecom.fr/muscariello/report-itc-transport

  • Dai H, Wang Y, Fan J, Liu B (2013) Mitigate DDoS attacks in NDN by interest traceback. In: Proceedings of IEEE INFOCOM NOMEN workshop, Turin, Italy

  • Dannewitz (2009) NetInf: an information-centric design for the future internet. In: Proceedings of the 3rd GI/ITG KuVS workshop on the future internet, Munich, Germany, May

  • Fotiou N, Nikander P, Trossen D, Polyzos GC (2010) Developing information networking further: from PSIRP to PURSUIT. In: Proceedings of the international ICST conference broadband communications, networks, and systems (BROADNETS), 2010 (invited paper), Oct 2010

  • Gasti P, Tsudik G, Uzun E, Zhang L (2012) DoS & DDoS in named-data networking. ArXive-prints. Tech Rep 1208.0952v2, Aug 2012

  • Jacobson V, Semtters DK, Thornton JD, Plass MF, Briggs NH, Braynard RL (2012) Networking named content. Commun ACM 55(1):117–124

    Article  Google Scholar 

  • Jacobson V, Smetters DK, Thornton JD, Plass MF, Briggs NH, Braynard RL (Dec 2009) Networking named content. In: Proceedings of the ACM CoNEXT, Rome, Italy

  • Koponen T, Ermolinskiy A, Chawla M, Kim KH, Stoica I, gon Chun B, Shenker S (2007) A data oriented (and beyond) network architecture. In: Proceedings of the SIGCOMM, Kyoto, Japan

  • Lagutin D, Visala K, Tarkoma S (2010) Publish/subscribe for internet: PSIRP perspective. Towards Future Internet Emerg Trends Eur Res 4:75–84

    Google Scholar 

  • Lauinger T (2010) Security & scalability of content-centric networking. Master’s thesis of Technische Universitat Darmstadt and Eurcom

  • Sekar V, Duffield N, Spatscheck O (2006) Lads: large-scale automated ddos detection system. In: Proceedings of the USENIX technical conference, Jun 2006

  • Spring N, Mahajan R, Wetherall D (2004) Measuring ISP topologies with rocketfuel. IEEE/ACM Trans Netw (TON) 12(1):2–16

    Article  Google Scholar 

  • The CCN project team, Named Data Networking (CCN) Project (2010) PARC Technical, Report CCN-0001, Oct 2010

  • Visala K, Lagutin D, Tarkoma S (2009) LANES: An inter-domain data-oriented routing architecture. In: Proceedings of the 2009 workshop on re-architecting the internet, Italy, Rome, Dec 2009

  • Wahlisch M, Schmidt TC, Vahlenkamp M (2013) Lessons from the past why data-driven states harm future information-centric networking. In: Proceedings of IFIP networking

  • Widjaja I (2012) Towards a flexible resource management system for content centric networking. In: Proceedings of the IEEE ICC

  • Yi C, Afanasyev A, Moiseenko I, Wang L, Zhang B, Zhang L (2013) A case for stateful forwarding plane. Comput Commun 36:779–791

    Article  Google Scholar 

  • Zadeh L (1965) Fuzzy sets. Inform Control 8(3):338–353

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Wang.

Additional information

Communicated by A. Castiglione.

This research is supported by the National Basic Research Program of China (“973 program”) (2013CB329101), the National High-Tech Research and Development Program of China (863) (2011AA010701), the National Natural Science Foundation of China (NSFC) (61232017, 61271202, 61271201, 61003283, 61102049), Beijing Natural Science Foundation (4122060, 4132053) and SRF for ROCS, SEM (W13C300010).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, K., Zhou, H., Qin, Y. et al. Cooperative-Filter: countering Interest flooding attacks in named data networking. Soft Comput 18, 1803–1813 (2014). https://doi.org/10.1007/s00500-014-1275-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-014-1275-z

Keywords

Navigation