Skip to main content

Detection of Cache Pollution Attacks in a Secure Information-Centric Network

  • Conference paper
  • First Online:
Data Analytics and Management

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 54))

Abstract

The future of Internet architectures is information-centric networking structure, to solve the problems of content spoofing attacks in the current Internet structure, making it more useful for IoT-based applications. The ICN is structured with the Internet forwarding state technology which is an advanced technology with a comparative structure. In this paper, we are concentrating on the Internet forwarding strategy which uses data forwarding in NDN-based networking. It understands content priority and prefixes the content parameter and passes through the named data network to deliver the packet based on the demands. Also, future Internet router cache could face the problem of overflowing with non-popular content due to cache pollution attack (CPA); i.e., the router keeps receiving requests for vulnerable content. The detection and defense against such spoofing attacks are especially difficult due to cache pollution attack’s similarities with every other consumer request. Based on the hobby content priority, named records networking accelerates the process and decreases the traffic to reach the request with low latency site visitors. We thereby address the present-day measures, arrangements and endeavors of the apparatus’s applied clustering approach to discover and defend against CPAs. Finally, we recommend the improved decision tree method where once any attack is detected an assault table will be updated to report any abnormal requests. While such requests are nevertheless forwarded, the corresponding content chunks are not cached. We carry out the above technique simulations with the aid of ndnSIM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xie M, Widjaja I, Wang H (2012) Enhancing cache robustness for content-centric networking. In: Proceedings of the international conference on computer communications (INFOCOM’12), vol 131, no 5, pp 2426–2434

    Google Scholar 

  2. Park H, Widjaja I, Lee H (2012) Detection of cache pollution attacks using randomness checks. In: IEEE international conference on communications, pp 1096–1100

    Google Scholar 

  3. Xu Z, Chen B, Wang N, Zhang Y, Li Z (2016) ELDA: towards efficient and lightweight detection of cache pollution attacks in NDN. In: Local Comput Networks, 2016, pp 82–90

    Google Scholar 

  4. Gao Y, Deng L Kuzmanovic A, Chen Y (2006) Internet cache pollution attacks and countermeasures. In: IEEE international conference on network protocols, ICNP 2006, Santa Barbara, CA, USA, 12–15 Nov 2006, pp 54–64

    Google Scholar 

  5. Gao Y, Deng L et al (2006) Internet cache pollution attacks and countermeasures. In: ICNP. IEEE

    Google Scholar 

  6. Xie M, Widjaja I et al (2012) Enhancing cache robustness for content-centric networking. In: INFOCOM. IEEE

    Google Scholar 

  7. Salah H, Alfatafta M, SayedAhmed S, Strufe T (2017) CoMon++: preventing cache pollution in NDN efficiently and effectively. In: Proceedings of the 42nd IEEE conference on local computer networks (LCN’17), pp 1–9

    Google Scholar 

  8. Zhang G, Liu J, Chang X, Chen Z (2017) Combining popularity and locality to enhance in-network caching performance and mitigate pollution attacks in content-centric networking. IEEE Access 5:19012–19022

    Article  Google Scholar 

  9. Roberts J (2009) The clean-slate approach to future internet design: a survey of research initiatives. Ann Telecommun 64(5):271–276

    Article  Google Scholar 

  10. Conti M, Gasti P et al (2013) A lightweight mechanism for detection of cache pollution attacks in named data networking. Comput Netw 57(16):3178–3191

    Article  Google Scholar 

  11. Gupta R, Chi C-H (1990) Improving instruction cache behavior by reducing cache pollution. In: Supercomputing. IEEE

    Google Scholar 

  12. Afanasyev A, Moiseenko I et al (2012) ndnSIM: NDN simulator for NS-3. Technical report, UCLA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akanksha Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, A., Nahar, P. (2021). Detection of Cache Pollution Attacks in a Secure Information-Centric Network. In: Khanna, A., Gupta, D., Pólkowski, Z., Bhattacharyya, S., Castillo, O. (eds) Data Analytics and Management. Lecture Notes on Data Engineering and Communications Technologies, vol 54. Springer, Singapore. https://doi.org/10.1007/978-981-15-8335-3_30

Download citation

Publish with us

Policies and ethics