2013 22nd International Conference on Computer Communication and Networks (ICCCN) 2013
DOI: 10.1109/icccn.2013.6614127
|View full text |Cite
|
Sign up to set email alerts
|

DoS and DDoS in Named Data Networking

Abstract: With the growing realization that current Internet protocols are reaching the limits of their senescence, a number of on-going research efforts aim to design potential next-generation Internet architectures. Although they vary in maturity and scope, in order to avoid past pitfalls, these efforts seek to treat security and privacy as fundamental requirements. Resilience to Denialof-Service (DoS) attacks that plague today's Internet is a major issue for any new architecture and deserves full attention.In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
256
1
12

Year Published

2013
2013
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 259 publications
(281 citation statements)
references
References 23 publications
0
256
1
12
Order By: Relevance
“…CCN provides a public key signature-based data packet authentication method as a built-in integrity and authentication mechanism. Although using digital signature certainly fulfills data integrity and authentication for CCN data packets, it causes significant overhead from signature generation and verification on network nodes including publishers and requesters, which limits widespread CCN utilization and may lead to a new kind of DDoS attacks [17].…”
Section: Content-centric Networking (Ccn) and Content Authentication mentioning
confidence: 99%
“…CCN provides a public key signature-based data packet authentication method as a built-in integrity and authentication mechanism. Although using digital signature certainly fulfills data integrity and authentication for CCN data packets, it causes significant overhead from signature generation and verification on network nodes including publishers and requesters, which limits widespread CCN utilization and may lead to a new kind of DDoS attacks [17].…”
Section: Content-centric Networking (Ccn) and Content Authentication mentioning
confidence: 99%
“…Gasti et al [12] present a first attempt to identify and mitigate DoS and DDoS in ICN. Particularly, the paper describes two types of attacks: interest flooding and content/cache poisoning.…”
Section: Related Workmentioning
confidence: 99%
“…This identification can be refined either by signature confirmation over haphazardly chose Data bundles, or by warnings gotten from end customers. Gasti et al [7] give a thorough investigation of DoS dangers to NDN systems and moderation procedures.…”
Section: Congestion-mentioning
confidence: 99%