Exploiting information centric networking to build an attacker-controlled content delivery network

作者: Giulia Mauri , Riccardo Raspadori , Mario Gerlay , Giacomo Verticale

DOI: 10.1109/MEDHOCNET.2015.7173159

关键词:

摘要: The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers fetch content from downstream nodes, such as when a home user is fetched neighbor’s router, with significant improvement. This paper shows how an attacker using compromised hosts can easily gather massive amount low-cost, low-latency storage malware, junk, other attacker-controlled content. We conclude by considering countermeasure, blacklist fed honeypot, which we show be effective.

参考文章(14)
Ilya Moiseenko, Alexander Afanasyev, Ersin Uzun, Lixia Zhang, Priya Mahadevan, Interest flooding attack and countermeasures in Named Data Networking 2013 IFIP Networking Conference. pp. 1- 9 ,(2013)
Giovanna Carofiglio, Diego Perino, Luca Muscariello, Massimo Gallo, Modeling data transfer in content-centric networking international teletraffic congress. pp. 111- 118 ,(2011) , 10.5555/2043468.2043487
Ioannis Psaras, Richard G Clegg, Raul Landa, Wei Koong Chai, George Pavlou, None, Modelling and evaluation of CCN-caching trees international ifip tc networking conference. pp. 78- 91 ,(2011) , 10.1007/978-3-642-20757-0_7
Gergely Acs, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Cache Privacy in Named-Data Networking international conference on distributed computing systems. pp. 41- 51 ,(2013) , 10.1109/ICDCS.2013.12
Mengjun Xie, Indra Widjaja, Haining Wang, Enhancing cache robustness for content-centric networking international conference on computer communications. pp. 2426- 2434 ,(2012) , 10.1109/INFCOM.2012.6195632
Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard, Networking named content Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT '09. pp. 1- 12 ,(2009) , 10.1145/1658939.1658941
Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang, None, DoS and DDoS in Named Data Networking international conference on computer communications and networks. pp. 1- 7 ,(2013) , 10.1109/ICCCN.2013.6614127
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmanovic, Pollution attacks and defenses for Internet caching systems Computer Networks. ,vol. 52, pp. 935- 956 ,(2008) , 10.1016/J.COMNET.2007.11.019
Luca Muscariello, Giovanna Carofiglio, Massimo Gallo, Bandwidth and storage sharing performance in information centric networking acm special interest group on data communication. pp. 26- 31 ,(2011) , 10.1145/2018584.2018593
Giuseppe Rossini, Dario Rossi, Coupling caching and forwarding: benefits, analysis, and implementation conference on information-centric networking. pp. 127- 136 ,(2014) , 10.1145/2660129.2660153