Abstract
Named Data Networking (NDN) is recognized as one of the most promising future Internet architectures, employing semantic classification to identify devices, thereby enhancing network usability, scalability, and resilience compared to traditional configurations. However, as an emergent technology, NDN necessitates further development, particularly in areas like enhancing signature privacy and data security. This paper primarily addresses the detection and mitigation of cache pollution attacks, a significant issue in the existing NDN mechanisms. Our proposed method involves generating real-time genuine and counterfeit corrupted ranked lists of requested packets. By comparing these lists, abnormal fluctuations in packet numbers and request rates—indicators of potential attacks—can be detected. A distinctive feature of our system is its ability to differentiate between normal attacks and certain emergency events, restraining only the former that addresses the challenge left unresolved by the Cache protection method based on Prefix Hierarchy for content-oriented network (CPMH) model, which is a state-of-the-art and widely used mechanism for protecting cache pollution attack in NDN. Simulation results confirm that the proposed mechanism effectively distinguishes between legitimate popular contents and malicious contents as well as increases a minimum of 10% cache hit ratio during attack situation compared to the CPMH.
Original language | English |
---|---|
Article number | 101142 |
Journal | Internet of Things (Netherlands) |
Volume | 26 |
DOIs | |
Publication status | Published - Jul 2024 |
Keywords
- Attack detection
- Cache pollution
- Named data networking
ASJC Scopus subject areas
- Software
- Computer Science (miscellaneous)
- Information Systems
- Engineering (miscellaneous)
- Hardware and Architecture
- Computer Science Applications
- Artificial Intelligence
- Management of Technology and Innovation