作者: Giulia Mauri , Riccardo Raspadori , Mario Gerlay , Giacomo Verticale
DOI: 10.1109/MEDHOCNET.2015.7173159
关键词:
摘要: The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers fetch content from downstream nodes, such as when a home user is fetched neighbor’s router, with significant improvement. This paper shows how an attacker using compromised hosts can easily gather massive amount low-cost, low-latency storage malware, junk, other attacker-controlled content. We conclude by considering countermeasure, blacklist fed honeypot, which we show be effective.