Abstract
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.
Article PDF
Avoid common mistakes on your manuscript.
References
Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, and Gene Tsudik. Cache privacy in named-data networking. In Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on, pages 41–51. IEEE, 2013.
Lada A Adamic and Bernardo A Huberman. Zipf’s law and the internet. Glottometrics, 3(1):143–150, 2002.
Alexander Afanasyev, Ilya Moiseenko, Lixia Zhang, et al. ndnsim: Ndn simulator for ns-3. University of California, Los Angeles, Tech. Rep, 4, 2012.
Ertugrul Dogruluk, Antonio Costa, and Joaquim Macedo. Evaluating privacy attacks in named data network. In Computers and Communication (ISCC), 2016 IEEE Symposium on, pages 1251–1256. IEEE, 2016.
Ali Ghodsi, Scott Shenker, Teemu Koponen, Ankit Singla, Barath Raghavan, and James Wilcox. Information-centric networking: seeing the forest for the trees. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, page 1. ACM, 2011.
Cisco Visual Networking Index. Global mobile data traffic forecast update, 2016–2021 white paper, 2017.
Van Jacobson, M Mosko, D Smetters, and JJ Garcia-Luna-Aceves. Content centric networking. whitepaper 2007, 2009.
Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, and Ion Stoica. A data-oriented (and beyond) network architecture. In ACM SIGCOMM Computer Communication Review, volume 37, pages 181–192. ACM, 2007.
Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst Biersack, and Engin Kirda. Privacy implications of ubiquitous caching in named data networking architectures. Technical Report TR-iSecLab-0812-001, ISecLab, Tech. Rep., 2012.
Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, and Yongdae Kim. Protecting access privacy of cached contents in information centric networks. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 173–178. ACM, 2013.
Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, and Yongdae Kim. Timing attacks on access privacy in information centric networks and countermeasures. IEEE Transactions on Dependable and Secure Computing, 12(6):675–687, 2015.
Nonhlanhla Ntuli and Sunyoung Han. Detecting router cache snooping in named data networking. In ICT Convergence (ICTC), 2012 International Conference on, pages 714–718. IEEE, 2012.
George F Riley and Thomas R Henderson. The ns-3 network simulator. In Modeling and tools for network simulation, pages 15–34. Springer, 2010.
FJ Ramón Salguero. Content mediator architecture for content-aware networks. COMET EU FP7 Report, 2010.
Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, Patrick Crowley, Christos Papadopoulos, Lan Wang, Beichuan Zhang, et al. Named data networking. ACM SIGCOMM Computer Communication Review, 44(3):66–73, 2014.
Lixia Zhang, Deborah Estrin, Jeffrey Burke, Van Jacobson, James D Thornton, Diana K Smetters, Beichuan Zhang, Gene Tsudik, Dan Massey, Christos Papadopoulos, et al. Named data networking (ndn) project. Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC, 2010.
Zengwu Zhang and Ke Zhang. Research on security and privacy issues of ndn. 2014.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Kumar, N., Singh, A.K. & Srivastava, S. A Triggered Delay-based Approach against Cache Privacy Attack in NDN. Int J Netw Distrib Comput 6, 174–184 (2018). https://doi.org/10.2991/ijndc.2018.6.3.5
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2018.6.3.5