Skip to main content
Log in

IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

The performance of named data networking (NDN) depends on the caching efficiency of routers. Cache pollution attack (CPA) refers to colonization of unpopular contents in the content store (CS) of an NDN router, which leads to declined quality of service (QoS) in NDN. CPA has very few solutions proposed for its mitigation. Most of these solutions are based on the statistics of the router itself. However, an attacker can influence these statistics by requesting unpopular contents repeatedly. This article proposes a new parameter for the detection of CPA, which is based on the number of distinct users requesting interest packets for a content over a period of time. The local popularity of the attackers’ content does not affect the proposed approach. The results show that the proposed approach consumes less storage, reduces processing time, and more effectively mitigates the CPA, as compared to the other existing approaches. Compared with the previous approaches, the proposed approach exhibits an improvement of approximately 28.14% to 36.80%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Availability of data and material

Not applicable.

Code Availability

Not applicable.

References

  1. Cisco VNI; Cisco visual networking index: forecast and trends, 2017-2022, (2016)

  2. Koponen, T.; Chawla, M.; Chun, B.G.; Ermolinskiy, A.; Kim, K.H.; Shenker, S.; Stoica, I.: A data-oriented (and beyond) network architecture. SIGCOMM Comput. Commun. Rev. 37(4), 181–192 (2007)

    Article  Google Scholar 

  3. García, G.; Beben, A.; Ramón, F J.; Maeso, A; Psaras, I.; Pavlou, G.; Wang, N.; Śliwiński, J.; Spirou, S.; Soursos, S.; et al.: Comet: Content Mediator architecture for Content-Aware Networks. In: Future Network & Mobile Summit (FutureNetw), 2011, pp. 1–8. IEEE, (2011)

  4. Jacobson, V.; Mosko, M.; Smetters, D.; Garcia-Luna-Aceves, J.: Content-Centric Networking. Whitepaper, Palo Alto Research Center pp. 2–4. (2007)

  5. Afanasyev, A.; Mahadevan, P.; Moiseenko, I.; Uzun E; Zhang, L.: Interest Flooding Attack and Countermeasures in Named Data Networking. In 2013 IFIP Networking Conference, p. 1–9. IEEE, (2013)

  6. Lauinger, T.; Laoutaris, N.; Rodriguez, P.; Strufe, T.; Biersack, E.; Kirda, E.: Privacy risks in named data networking: what is the cost of performance? ACM SIGCOMM Comput. Commun. Rev. 42(5), 54–57 (2012)

    Article  Google Scholar 

  7. Deng, L.; Gao, Y.; Chen, Y.; Kuzmanovic, A.: Pollution attacks and defenses for internet caching systems. Comput. Netw. 52(5), 935–956 (2008)

    Article  Google Scholar 

  8. Park, H.; Widjaja, I.; Lee, H.: Detection of Cache Pollution Attacks Using Randomness Checks. In: Communications (ICC), 2012 IEEE International Conference on, pp. 1096–1100. IEEE, (2012)

  9. Xie, M.; Widjaja, I.; Wang, H.: Enhancing Cache Robustness for Content-centric Networking. In: INFOCOM, 2012 Proceedings IEEE, pp. 2426–2434. IEEE, (2012)

  10. Conti, M.; Gasti, P.; Teoli, M.: A lightweight mechanism for detection of cache pollution attacks in named data networking. Comput. Netw. 57, 3178–3191 (2013)

    Article  Google Scholar 

  11. Karami, A.; Guerrero-Zapata, M.: An anfis-based cache replacement method for mitigating cache pollution attacks in named data networking. Comput. Netw. 80, 51–65 (2015)

    Article  Google Scholar 

  12. Xu, Z.; Chen, B.; Wang, N.; Zhang, Y.; Li, Z.: Elda: towards efficient and lightweight detection of cache pollution attacks in NDN. In: Local Computer Networks (LCN), 2015 IEEE 40th Conference on, pp. 82–90. IEEE, (2015)

  13. Kamimoto, T.; Mori, K.; Umeda, S.; Ohata, Y.; Shigeno, H.: Cache Protection Method based on Prefix Hierarchy for Content-Oriented Network. In: 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC), (2016)

  14. Salah, H.; Alfatafta, M.; SayedAhmed, S.; Strufe, T.: Comon: Preventing Cache Pollution in NDN Efficiently and Effectively. In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN)

  15. Zhang, G.; Liu, J.; Chnag, X.; Chen, Z.: Combining popularity and locality to enhance in-network caching performance and mitigate pollution attacks in content-centric networking. IEEE Access 5, 19012–19022 (2017)

    Article  Google Scholar 

  16. Deng, L.; Gao, Y.; Chen, Y.; Kuzmanovic, A.: Pollution attacks and defenses for internet caching systems. Comput. Netw. 52(5), 935–956 (2008)

    Article  Google Scholar 

  17. Gao, Y.; Deng, L.; Kuzmanovic, A.; Chen, Y.: Internet Cache Pollution Attacks and Countermeasures. In: Proceedings of the 2006 IEEE International Conference on Network Protocols, pp. 54–64. IEEE, (2006)

  18. Gilks, W.R.; Richardson, S.; Spiegelhalter, D.: Markov Chain Monte Carlo in Practice. CRC Press, Boca Raton, Florida (1995)

    Book  Google Scholar 

  19. Liu, Y.; Zhi, T.; Xi, H.; Quan, W.; Zhang, H.: A Novel Cache Replacement Scheme Against Cache Pollution Attack In Content-centric Networks. In: 2019 IEEE/CIC International Conference on Communications in China (ICCC), pp. 207–212. IEEE, (2019)

  20. Yao, L.; Zeng, Y.; Wang, X.; Chen, A; Wu, G.: Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking. IEEE Transactions on Dependable and Secure Computing, (2020)

  21. Singh, V.P.; Ujjwal, R.L.: Gini impurity based ndn cache pollution attack defence mechanism. J. Inform. Opt. Sci. 41(6), 1353–1363 (2020)

    Google Scholar 

  22. Zhou, J.; Luo, J.; Deng, L.; Wang, J.: Cache pollution prevention mechanism based on cache partition in v-ndn. In: 2020 IEEE/CIC International Conference on Communications in China (ICCC), pp. 330–335. IEEE, (2020)

  23. Hidouri, A.; Hadded, M.; Hajlaoui, N.; Touati, H.; Muhlethaler, P.: Cache Pollution Attacks in the NDN Architecture: Impact and Analysis. In: 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–6. IEEE, (2021)

  24. Croarkin, C.; Tobias, P.; Zey, C.; et al.: Single exponential smoothing, (2002)

  25. Carneiro, G.: Ns-3: Network Simulator 3. In: UTM Lab Meeting April, vol 20, pp. 4–5, (2010)

  26. Alexander, A.; Moiseenko, I.; Zhang, L.; et al.: ndnsim: NDN simulator for ns-3. University of California, Los Angeles (2012)

    Google Scholar 

  27. Silagadze, ZK.: Citations and the zipf-mandelbrot’s law. arXiv preprint arXiv: physics/9901035, (1999)

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have immensely contributed for the research work.

Corresponding author

Correspondence to Naveen Kumar.

Ethics declarations

Conflicts of interest:

None.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, N., Srivastava, S. IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity. Arab J Sci Eng 49, 3241–3251 (2024). https://doi.org/10.1007/s13369-023-07919-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-023-07919-1

Keywords

Navigation