Cargando…
Detection of malicious consumer interest packet with dynamic threshold values
As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of co...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8022593/ https://www.ncbi.nlm.nih.gov/pubmed/33834105 http://dx.doi.org/10.7717/peerj-cs.435 |
_version_ | 1783674962705383424 |
---|---|
author | Qureshi, Adnan Mahmood Anjum, Nadeem Rais, Rao Naveed Bin Ur-Rehman, Masood Qayyum, Amir |
author_facet | Qureshi, Adnan Mahmood Anjum, Nadeem Rais, Rao Naveed Bin Ur-Rehman, Masood Qayyum, Amir |
author_sort | Qureshi, Adnan Mahmood |
collection | PubMed |
description | As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequently isolates the legitimate content in the network. In the past, several efforts have been made to propose the mitigation strategies for the content poisoning attack, but to the best of our knowledge, no specific work has been done to address an emerging attack-surface in NDN, which we call an interest flooding attack. Handling this attack-surface can potentially make content poisoning attack mitigation schemes more effective, secure, and robust. Hence, in this article, we propose the addition of a security mechanism in the CPA mitigation scheme that is, Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe, in which we block the malicious face of compromised consumers by monitoring the Cache-Miss Ratio values and the Queue Capacity at the Edge Routers. The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification overhead at the NDN Routers. |
format | Online Article Text |
id | pubmed-8022593 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-80225932021-04-07 Detection of malicious consumer interest packet with dynamic threshold values Qureshi, Adnan Mahmood Anjum, Nadeem Rais, Rao Naveed Bin Ur-Rehman, Masood Qayyum, Amir PeerJ Comput Sci Computer Networks and Communications As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequently isolates the legitimate content in the network. In the past, several efforts have been made to propose the mitigation strategies for the content poisoning attack, but to the best of our knowledge, no specific work has been done to address an emerging attack-surface in NDN, which we call an interest flooding attack. Handling this attack-surface can potentially make content poisoning attack mitigation schemes more effective, secure, and robust. Hence, in this article, we propose the addition of a security mechanism in the CPA mitigation scheme that is, Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe, in which we block the malicious face of compromised consumers by monitoring the Cache-Miss Ratio values and the Queue Capacity at the Edge Routers. The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification overhead at the NDN Routers. PeerJ Inc. 2021-03-17 /pmc/articles/PMC8022593/ /pubmed/33834105 http://dx.doi.org/10.7717/peerj-cs.435 Text en © 2021 Qureshi et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Qureshi, Adnan Mahmood Anjum, Nadeem Rais, Rao Naveed Bin Ur-Rehman, Masood Qayyum, Amir Detection of malicious consumer interest packet with dynamic threshold values |
title | Detection of malicious consumer interest packet with dynamic threshold values |
title_full | Detection of malicious consumer interest packet with dynamic threshold values |
title_fullStr | Detection of malicious consumer interest packet with dynamic threshold values |
title_full_unstemmed | Detection of malicious consumer interest packet with dynamic threshold values |
title_short | Detection of malicious consumer interest packet with dynamic threshold values |
title_sort | detection of malicious consumer interest packet with dynamic threshold values |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8022593/ https://www.ncbi.nlm.nih.gov/pubmed/33834105 http://dx.doi.org/10.7717/peerj-cs.435 |
work_keys_str_mv | AT qureshiadnanmahmood detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues AT anjumnadeem detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues AT raisraonaveedbin detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues AT urrehmanmasood detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues AT qayyumamir detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues |