2021
DOI: 10.7717/peerj-cs.435
|View full text |Cite
|
Sign up to set email alerts
|

Detection of malicious consumer interest packet with dynamic threshold values

Abstract: As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potential… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 25 publications
(31 reference statements)
0
1
0
Order By: Relevance
“…Authors in [99] and [100] suggest that in replay attack, the attacker performs a MiTM attack and attempts to obtain a copy of the message from the sender, following which he or she modifies the message and sends it to the recipient. The recipient believes that the communication has been forwarded to him by the original sender, whereas in fact it has been modified by an attacker with harmful intent and forwarded to him.…”
Section: ) Blockchainmentioning
confidence: 99%
“…Authors in [99] and [100] suggest that in replay attack, the attacker performs a MiTM attack and attempts to obtain a copy of the message from the sender, following which he or she modifies the message and sends it to the recipient. The recipient believes that the communication has been forwarded to him by the original sender, whereas in fact it has been modified by an attacker with harmful intent and forwarded to him.…”
Section: ) Blockchainmentioning
confidence: 99%