Cargando…

Detection of malicious consumer interest packet with dynamic threshold values

As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of co...

Descripción completa

Detalles Bibliográficos
Autores principales: Qureshi, Adnan Mahmood, Anjum, Nadeem, Rais, Rao Naveed Bin, Ur-Rehman, Masood, Qayyum, Amir
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8022593/
https://www.ncbi.nlm.nih.gov/pubmed/33834105
http://dx.doi.org/10.7717/peerj-cs.435
_version_ 1783674962705383424
author Qureshi, Adnan Mahmood
Anjum, Nadeem
Rais, Rao Naveed Bin
Ur-Rehman, Masood
Qayyum, Amir
author_facet Qureshi, Adnan Mahmood
Anjum, Nadeem
Rais, Rao Naveed Bin
Ur-Rehman, Masood
Qayyum, Amir
author_sort Qureshi, Adnan Mahmood
collection PubMed
description As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequently isolates the legitimate content in the network. In the past, several efforts have been made to propose the mitigation strategies for the content poisoning attack, but to the best of our knowledge, no specific work has been done to address an emerging attack-surface in NDN, which we call an interest flooding attack. Handling this attack-surface can potentially make content poisoning attack mitigation schemes more effective, secure, and robust. Hence, in this article, we propose the addition of a security mechanism in the CPA mitigation scheme that is, Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe, in which we block the malicious face of compromised consumers by monitoring the Cache-Miss Ratio values and the Queue Capacity at the Edge Routers. The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification overhead at the NDN Routers.
format Online
Article
Text
id pubmed-8022593
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-80225932021-04-07 Detection of malicious consumer interest packet with dynamic threshold values Qureshi, Adnan Mahmood Anjum, Nadeem Rais, Rao Naveed Bin Ur-Rehman, Masood Qayyum, Amir PeerJ Comput Sci Computer Networks and Communications As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequently isolates the legitimate content in the network. In the past, several efforts have been made to propose the mitigation strategies for the content poisoning attack, but to the best of our knowledge, no specific work has been done to address an emerging attack-surface in NDN, which we call an interest flooding attack. Handling this attack-surface can potentially make content poisoning attack mitigation schemes more effective, secure, and robust. Hence, in this article, we propose the addition of a security mechanism in the CPA mitigation scheme that is, Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe, in which we block the malicious face of compromised consumers by monitoring the Cache-Miss Ratio values and the Queue Capacity at the Edge Routers. The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification overhead at the NDN Routers. PeerJ Inc. 2021-03-17 /pmc/articles/PMC8022593/ /pubmed/33834105 http://dx.doi.org/10.7717/peerj-cs.435 Text en © 2021 Qureshi et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Qureshi, Adnan Mahmood
Anjum, Nadeem
Rais, Rao Naveed Bin
Ur-Rehman, Masood
Qayyum, Amir
Detection of malicious consumer interest packet with dynamic threshold values
title Detection of malicious consumer interest packet with dynamic threshold values
title_full Detection of malicious consumer interest packet with dynamic threshold values
title_fullStr Detection of malicious consumer interest packet with dynamic threshold values
title_full_unstemmed Detection of malicious consumer interest packet with dynamic threshold values
title_short Detection of malicious consumer interest packet with dynamic threshold values
title_sort detection of malicious consumer interest packet with dynamic threshold values
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8022593/
https://www.ncbi.nlm.nih.gov/pubmed/33834105
http://dx.doi.org/10.7717/peerj-cs.435
work_keys_str_mv AT qureshiadnanmahmood detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues
AT anjumnadeem detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues
AT raisraonaveedbin detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues
AT urrehmanmasood detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues
AT qayyumamir detectionofmaliciousconsumerinterestpacketwithdynamicthresholdvalues