Abstract
Recently, network consumers use Internet for getting contents: videos, musics, photos, and other contents created by many producers. Those contents accelerate the increasing traffic volumes. For reducing the increasing traffic volume to keep stabilities of broadband network, realizing the concept of CCN (Contents Centric Networking) is strongly required. The NDN (Named Data Networking) which is the most popular network architecture have been proposed to realize the concept of CCN. However, it have been also reported that the NDN is vulnerable to CIFA (Collusive Interest Flooding Attack). In this paper, we propose a novel distributed algorithm for detecting CIFA for keep availabilities of NDN. The results of computer simulations confirm that our proposal can detect and mitigate the effects of CIFA, effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
According to the packet size and link bandwidth, each communication link can carries up to 100 packets during one second.
References
Dannewwitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–30 (2012)
Jacobson, V., Smetters, D., Thornton, J., Plass, M., Briggs, N., Braynard, R.: Networking named content. In: Proceedings of ACM CoNEXT 2009, pp. 1–12 (2009)
Named Data Networking (NDN) – A Future Internet Architecture. https://named-data.net. Accessed May 2017
Soniya, M., Kumar, K.: A survey on named data networking. In: Proceedings of 2015 2nd International Conference on Electronics and Communication Systems (ICECS 2015), Coimbatore, pp. 1515–1519 (2015)
Chen, Q., Xie, R., Yu, F., Liu, J., Huang, T., Liu, Y.: Transport control strategies in named data networking: a survey. IEEE Commun. Surv. Tutorials 18(3), 2052–2083 (2016)
Amado, M., Campolo, C., Molinaro, A., Mitton, N.: Named data networking: a natural design for data collection in wireless sensor networks. In: Wireless Days (WD), 2013 IFIP, Valencia, pp. 1–6 (2013)
Hail, M., Amado, M., Molinaro, A., Fischer, S.: Caching in named data networking for the wireless internet of things. In: Proceedings of 2015 International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015)
Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: A novel interest flooding attacks detection and countermeasure scheme in NDN. In: IEEE Global Communications Conference (GLOBECOM), Washington, DC 2016, pp. 1–7 (2016)
Shinohara, R., Kamimoto, T., Sato, K., Shigeno, H.: Cache control method mitigating packet concentration of router caused by interest flooding attack. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin 2016, pp. 324–331 (2016)
Sarah, H., Strufe, T.: Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In: Proceedings of 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 938-945 (2016)
Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, pp. 557–56 (2017)
Breslan, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf–like distributions: evidence and implications. In: Proceedings of 18th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 1999), vol. 1, pp. 126–134 (1999)
Acknowledgements
This work was supported by JSPS KAKENHI Grant Number JP17K00132.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Shigeyasu, T., Sonoda, A. (2019). Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking. In: Barolli, L., Kryvinska, N., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 22. Springer, Cham. https://doi.org/10.1007/978-3-319-98530-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-98530-5_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98529-9
Online ISBN: 978-3-319-98530-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)