Preventing DDoS attacks in Path Identifiers-Based Information Centric Networks

作者: Basheer Al-Duwairi , Oznur Ozkasap

DOI: 10.1109/NOMS47738.2020.9110388

关键词:

摘要: Information Centric Networks (ICNs) have emerged in recent years order to provide effective mechanisms for content distribution and retrieval. However, these future network architectures are vulnerable Distributed Denial of Service Attacks (DDoS). In this paper, we propose an mechanism counter attacks path identifier-based information centric networks. The proposed mechanism, called GET Message logging based filtering (GMLF), employs Bloom filter store incoming messages such that corresponding verified, while packets originating from malicious hosts.

参考文章(16)
Arvind Krishnamurthy, Thomas Anderson, Colin Dixon, Phalanx: withstanding multimillion-node botnets networked systems design and implementation. pp. 45- 58 ,(2008)
Tan Nguyen, Remi Cogranne, Guillaume Doyen, An optimal statistical test for robust detection against interest flooding attacks in CCN integrated network management. pp. 252- 260 ,(2015) , 10.1109/INM.2015.7140299
Hongbin Luo, Zhe Chen, Jianbo Cui, Hongke Zhang, Moshe Zukerman, Chunming Qiao, None, CoLoR: an information-centric internet architecture for innovations IEEE Network. ,vol. 28, pp. 4- 10 ,(2014) , 10.1109/MNET.2014.6843226
B. Al-Duwairi, G. Manimaran, JUST-Google: A Search Engine-Based Defense Against Botnet-Based DDoS Attacks 2009 IEEE International Conference on Communications. pp. 1057- 1061 ,(2009) , 10.1109/ICC.2009.5199127
Athanasios V. Vasilakos, Zhe Li, Gwendal Simon, Wei You, Information centric network: Research challenges and opportunities Journal of Network and Computer Applications. ,vol. 52, pp. 1- 10 ,(2015) , 10.1016/J.JNCA.2015.02.001
Xin Liu, Xiaowei Yang, Yong Xia, NetFence Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10. ,vol. 40, pp. 255- 266 ,(2010) , 10.1145/1851182.1851214
Burton H. Bloom, Space/time trade-offs in hash coding with allowable errors Communications of the ACM. ,vol. 13, pp. 422- 426 ,(1970) , 10.1145/362686.362692
Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, kc claffy, Patrick Crowley, Christos Papadopoulos, Lan Wang, Beichuan Zhang, Named data networking acm special interest group on data communication. ,vol. 44, pp. 66- 73 ,(2014) , 10.1145/2656877.2656887
Tan N. Nguyen, Remi Cogranne, Guillaume Doyen, Florent Retraint, Detection of interest flooding attacks in Named Data Networking using hypothesis testing international workshop on information forensics and security. pp. 1- 6 ,(2015) , 10.1109/WIFS.2015.7368571
Hongbin Luo, Zhe Chen, Jiawei Li, Athanasios V. Vasilakos, Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers IEEE Transactions on Information Forensics and Security. ,vol. 12, pp. 1801- 1815 ,(2017) , 10.1109/TIFS.2017.2688414