Skip to main content

Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking

  • Conference paper
  • First Online:
Advances in Network-Based Information Systems (NBiS 2018)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 22))

Included in the following conference series:

Abstract

Recently, network consumers use Internet for getting contents: videos, musics, photos, and other contents created by many producers. Those contents accelerate the increasing traffic volumes. For reducing the increasing traffic volume to keep stabilities of broadband network, realizing the concept of CCN (Contents Centric Networking) is strongly required. The NDN (Named Data Networking) which is the most popular network architecture have been proposed to realize the concept of CCN. However, it have been also reported that the NDN is vulnerable to CIFA (Collusive Interest Flooding Attack). In this paper, we propose a novel distributed algorithm for detecting CIFA for keep availabilities of NDN. The results of computer simulations confirm that our proposal can detect and mitigate the effects of CIFA, effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    According to the packet size and link bandwidth, each communication link can carries up to 100 packets during one second.

References

  1. Dannewwitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26–30 (2012)

    Article  Google Scholar 

  2. Jacobson, V., Smetters, D., Thornton, J., Plass, M., Briggs, N., Braynard, R.: Networking named content. In: Proceedings of ACM CoNEXT 2009, pp. 1–12 (2009)

    Google Scholar 

  3. Named Data Networking (NDN) – A Future Internet Architecture. https://named-data.net. Accessed May 2017

  4. Soniya, M., Kumar, K.: A survey on named data networking. In: Proceedings of 2015 2nd International Conference on Electronics and Communication Systems (ICECS 2015), Coimbatore, pp. 1515–1519 (2015)

    Google Scholar 

  5. Chen, Q., Xie, R., Yu, F., Liu, J., Huang, T., Liu, Y.: Transport control strategies in named data networking: a survey. IEEE Commun. Surv. Tutorials 18(3), 2052–2083 (2016)

    Article  Google Scholar 

  6. Amado, M., Campolo, C., Molinaro, A., Mitton, N.: Named data networking: a natural design for data collection in wireless sensor networks. In: Wireless Days (WD), 2013 IFIP, Valencia, pp. 1–6 (2013)

    Google Scholar 

  7. Hail, M., Amado, M., Molinaro, A., Fischer, S.: Caching in named data networking for the wireless internet of things. In: Proceedings of 2015 International Conference on Recent Advances in Internet of Things (RIoT), Singapore, pp. 1–6 (2015)

    Google Scholar 

  8. Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: A novel interest flooding attacks detection and countermeasure scheme in NDN. In: IEEE Global Communications Conference (GLOBECOM), Washington, DC 2016, pp. 1–7 (2016)

    Google Scholar 

  9. Shinohara, R., Kamimoto, T., Sato, K., Shigeno, H.: Cache control method mitigating packet concentration of router caused by interest flooding attack. In: IEEE Trustcom/BigDataSE/ISPA, Tianjin 2016, pp. 324–331 (2016)

    Google Scholar 

  10. Sarah, H., Strufe, T.: Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In: Proceedings of 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 938-945 (2016)

    Google Scholar 

  11. Xin, Y., Li, Y., Wang, W., Li, W., Chen, X.: Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, pp. 557–56 (2017)

    Google Scholar 

  12. Breslan, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf–like distributions: evidence and implications. In: Proceedings of 18th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 1999), vol. 1, pp. 126–134 (1999)

    Google Scholar 

Download references

Acknowledgements

This work was supported by JSPS KAKENHI Grant Number JP17K00132.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tetsuya Shigeyasu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shigeyasu, T., Sonoda, A. (2019). Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking. In: Barolli, L., Kryvinska, N., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 22. Springer, Cham. https://doi.org/10.1007/978-3-319-98530-5_7

Download citation

Publish with us

Policies and ethics