38th Annual IEEE Conference on Local Computer Networks 2013
DOI: 10.1109/lcn.2013.6761300
|View full text |Cite
|
Sign up to set email alerts
|

Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking

Abstract: Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. CCN focuses on content distribution, which is arguably not well served by IP. Named-Data Networking (NDN) is an example of CCN. NDN is also an active research project under the NSF Future Internet Architectures (FIA) program. FIA emphasizes security and privacy from the outset and by design. To be a viable Internet architecture, NDN must b… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
107
0
2

Year Published

2014
2014
2019
2019

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 171 publications
(109 citation statements)
references
References 16 publications
0
107
0
2
Order By: Relevance
“…The paper represents a first step into the definition of content/cache poisoning in NDN scenario, but it does not consider the problem of key validity. The papers [13] and [14] analyze the interest flooding-based DDoS over NDN, considering that interests are sent for non-existent contents and obviously fill up the victim's PIT. The authors in [13] propose proactive and reactive countermeasures, but then, they focus on reactive methods for detection of interest flooding via junk interests.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The paper represents a first step into the definition of content/cache poisoning in NDN scenario, but it does not consider the problem of key validity. The papers [13] and [14] analyze the interest flooding-based DDoS over NDN, considering that interests are sent for non-existent contents and obviously fill up the victim's PIT. The authors in [13] propose proactive and reactive countermeasures, but then, they focus on reactive methods for detection of interest flooding via junk interests.…”
Section: Related Workmentioning
confidence: 99%
“…The papers [13] and [14] analyze the interest flooding-based DDoS over NDN, considering that interests are sent for non-existent contents and obviously fill up the victim's PIT. The authors in [13] propose proactive and reactive countermeasures, but then, they focus on reactive methods for detection of interest flooding via junk interests. Moreover, the authors propose a mitigation technique, called Poseidon, which identifies traffic anomalies and keeps several statistics on expired interests.…”
Section: Related Workmentioning
confidence: 99%
“…One of the key goals of CCN projects is "security by design" [21]. In contrast to today's Internet, where security problems were identified along the way, the research community stresses both awareness of issues and support for features and countermeasures from the outset.…”
Section: Related Workmentioning
confidence: 99%
“…Prior work on Denial of Service (DoS) attacks on NDN includes [8] and [2]. Both results addressed a specific DoS attack type -Interest Flooding -based on inundating routers with spurious interest messages.…”
Section: Related Workmentioning
confidence: 99%
“…Scope: as reflected in the title, this paper focuses on networklayer trust issues, motivated by the content poisoning problem. We do not address other NDN security issues, such as interest flooding attacks [8,15,2], cache pollution attacks [10] and routing security [34].…”
Section: Introductionmentioning
confidence: 99%