2022
DOI: 10.1007/s10207-022-00591-w
|View full text |Cite
|
Sign up to set email alerts
|

A survey on interest packet flooding attacks and its countermeasures in named data networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 56 publications
0
2
0
Order By: Relevance
“…(1) Request flooding attack [24]: In this attack, an attacker floods the network with a large number of useless interest packets in a short amount of time, overwhelming the network and causing the cache table to be replaced constantly. This ultimately results in the route being unable to provide forwarding services to normal users.…”
Section: Threat Modelmentioning
confidence: 99%
“…(1) Request flooding attack [24]: In this attack, an attacker floods the network with a large number of useless interest packets in a short amount of time, overwhelming the network and causing the cache table to be replaced constantly. This ultimately results in the route being unable to provide forwarding services to normal users.…”
Section: Threat Modelmentioning
confidence: 99%
“…Phishing perpetrators adeptly mimic legitimate websites, particularly those related to online banking and e-commerce. This creates a symmetrical illusion that induces users to unwittingly divulge sensitive information, leading to various fraudulent actions [5,6].…”
Section: Introductionmentioning
confidence: 99%