Abstract
The performance of named data networking (NDN) depends on the caching efficiency of routers. Cache pollution attack (CPA) refers to colonization of unpopular contents in the content store (CS) of an NDN router, which leads to declined quality of service (QoS) in NDN. CPA has very few solutions proposed for its mitigation. Most of these solutions are based on the statistics of the router itself. However, an attacker can influence these statistics by requesting unpopular contents repeatedly. This article proposes a new parameter for the detection of CPA, which is based on the number of distinct users requesting interest packets for a content over a period of time. The local popularity of the attackers’ content does not affect the proposed approach. The results show that the proposed approach consumes less storage, reduces processing time, and more effectively mitigates the CPA, as compared to the other existing approaches. Compared with the previous approaches, the proposed approach exhibits an improvement of approximately 28.14% to 36.80%.
Similar content being viewed by others
Availability of data and material
Not applicable.
Code Availability
Not applicable.
References
Cisco VNI; Cisco visual networking index: forecast and trends, 2017-2022, (2016)
Koponen, T.; Chawla, M.; Chun, B.G.; Ermolinskiy, A.; Kim, K.H.; Shenker, S.; Stoica, I.: A data-oriented (and beyond) network architecture. SIGCOMM Comput. Commun. Rev. 37(4), 181–192 (2007)
García, G.; Beben, A.; Ramón, F J.; Maeso, A; Psaras, I.; Pavlou, G.; Wang, N.; Śliwiński, J.; Spirou, S.; Soursos, S.; et al.: Comet: Content Mediator architecture for Content-Aware Networks. In: Future Network & Mobile Summit (FutureNetw), 2011, pp. 1–8. IEEE, (2011)
Jacobson, V.; Mosko, M.; Smetters, D.; Garcia-Luna-Aceves, J.: Content-Centric Networking. Whitepaper, Palo Alto Research Center pp. 2–4. (2007)
Afanasyev, A.; Mahadevan, P.; Moiseenko, I.; Uzun E; Zhang, L.: Interest Flooding Attack and Countermeasures in Named Data Networking. In 2013 IFIP Networking Conference, p. 1–9. IEEE, (2013)
Lauinger, T.; Laoutaris, N.; Rodriguez, P.; Strufe, T.; Biersack, E.; Kirda, E.: Privacy risks in named data networking: what is the cost of performance? ACM SIGCOMM Comput. Commun. Rev. 42(5), 54–57 (2012)
Deng, L.; Gao, Y.; Chen, Y.; Kuzmanovic, A.: Pollution attacks and defenses for internet caching systems. Comput. Netw. 52(5), 935–956 (2008)
Park, H.; Widjaja, I.; Lee, H.: Detection of Cache Pollution Attacks Using Randomness Checks. In: Communications (ICC), 2012 IEEE International Conference on, pp. 1096–1100. IEEE, (2012)
Xie, M.; Widjaja, I.; Wang, H.: Enhancing Cache Robustness for Content-centric Networking. In: INFOCOM, 2012 Proceedings IEEE, pp. 2426–2434. IEEE, (2012)
Conti, M.; Gasti, P.; Teoli, M.: A lightweight mechanism for detection of cache pollution attacks in named data networking. Comput. Netw. 57, 3178–3191 (2013)
Karami, A.; Guerrero-Zapata, M.: An anfis-based cache replacement method for mitigating cache pollution attacks in named data networking. Comput. Netw. 80, 51–65 (2015)
Xu, Z.; Chen, B.; Wang, N.; Zhang, Y.; Li, Z.: Elda: towards efficient and lightweight detection of cache pollution attacks in NDN. In: Local Computer Networks (LCN), 2015 IEEE 40th Conference on, pp. 82–90. IEEE, (2015)
Kamimoto, T.; Mori, K.; Umeda, S.; Ohata, Y.; Shigeno, H.: Cache Protection Method based on Prefix Hierarchy for Content-Oriented Network. In: 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC), (2016)
Salah, H.; Alfatafta, M.; SayedAhmed, S.; Strufe, T.: Comon: Preventing Cache Pollution in NDN Efficiently and Effectively. In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN)
Zhang, G.; Liu, J.; Chnag, X.; Chen, Z.: Combining popularity and locality to enhance in-network caching performance and mitigate pollution attacks in content-centric networking. IEEE Access 5, 19012–19022 (2017)
Deng, L.; Gao, Y.; Chen, Y.; Kuzmanovic, A.: Pollution attacks and defenses for internet caching systems. Comput. Netw. 52(5), 935–956 (2008)
Gao, Y.; Deng, L.; Kuzmanovic, A.; Chen, Y.: Internet Cache Pollution Attacks and Countermeasures. In: Proceedings of the 2006 IEEE International Conference on Network Protocols, pp. 54–64. IEEE, (2006)
Gilks, W.R.; Richardson, S.; Spiegelhalter, D.: Markov Chain Monte Carlo in Practice. CRC Press, Boca Raton, Florida (1995)
Liu, Y.; Zhi, T.; Xi, H.; Quan, W.; Zhang, H.: A Novel Cache Replacement Scheme Against Cache Pollution Attack In Content-centric Networks. In: 2019 IEEE/CIC International Conference on Communications in China (ICCC), pp. 207–212. IEEE, (2019)
Yao, L.; Zeng, Y.; Wang, X.; Chen, A; Wu, G.: Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking. IEEE Transactions on Dependable and Secure Computing, (2020)
Singh, V.P.; Ujjwal, R.L.: Gini impurity based ndn cache pollution attack defence mechanism. J. Inform. Opt. Sci. 41(6), 1353–1363 (2020)
Zhou, J.; Luo, J.; Deng, L.; Wang, J.: Cache pollution prevention mechanism based on cache partition in v-ndn. In: 2020 IEEE/CIC International Conference on Communications in China (ICCC), pp. 330–335. IEEE, (2020)
Hidouri, A.; Hadded, M.; Hajlaoui, N.; Touati, H.; Muhlethaler, P.: Cache Pollution Attacks in the NDN Architecture: Impact and Analysis. In: 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–6. IEEE, (2021)
Croarkin, C.; Tobias, P.; Zey, C.; et al.: Single exponential smoothing, (2002)
Carneiro, G.: Ns-3: Network Simulator 3. In: UTM Lab Meeting April, vol 20, pp. 4–5, (2010)
Alexander, A.; Moiseenko, I.; Zhang, L.; et al.: ndnsim: NDN simulator for ns-3. University of California, Los Angeles (2012)
Silagadze, ZK.: Citations and the zipf-mandelbrot’s law. arXiv preprint arXiv: physics/9901035, (1999)
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
All the authors have immensely contributed for the research work.
Corresponding author
Ethics declarations
Conflicts of interest:
None.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, N., Srivastava, S. IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity. Arab J Sci Eng 49, 3241–3251 (2024). https://doi.org/10.1007/s13369-023-07919-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-023-07919-1