Browse > Article
http://dx.doi.org/10.3837/tiis.2019.11.022

Mitigating Cache Pollution Attack in Information Centric Mobile Internet  

Chen, Jia (National Laboratory of Next Generation Internet Interconnection Device, Department of Electronic and Information Engineering, Beijing Jiaotong University)
Yue, Liang (China Unicom Network Technology Research Center)
Chen, Jing (National Laboratory of Next Generation Internet Interconnection Device, Department of Electronic and Information Engineering, Beijing Jiaotong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.11, 2019 , pp. 5673-5691 More about this Journal
Abstract
Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.
Keywords
Information Centric; Cache Pollution Attacks; Mobile Internet; Content Popularity; False locality;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica, "A data-oriented (and beyond) network architecture," in Proc. of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, pp.181-192, August 27-31, 2007.
2 PURSUIT. http://www.fp7-pursuit.eu.
3 Named Data Networking (NDN). http://www.named-data.org.
4 Hongke Zhang, Wei Quan, Han-chieh Chao and Chunming Qiao, "Smart Identifier Network: A collaborative architecture for the future Internet," IEEE Network, vol. 30, no. 3, pp. 46-51, 2016.   DOI
5 V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content," Communications of the ACM, vol. 55, no. 1, pp. 117-124, January, 2012.   DOI
6 N. L. van Adrichem and F. A. Kuipers, "Globally accessible names in named data networking," in Proc. of 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1-6, April 14-19, 2013.
7 A. Afanasyev, X. Jiang, Y. Yu, J. Tan, Y. Xia, A. Mankin, and L. Zhang, "NDNS: A DNS-like name service for NDN," in Proc. of IEEE Conference on Computer Communications and Networks (ICCCN), pp.1-9, 31 July-3 August, 2017.
8 Jia Chen, Bo Tong and Hongke Zhang, "Dynamic Interest Transmission Approach for Improving Link Failure Resiliency in Content Centric Network," IEEE Transactions on Network and Service Management, vol. 15, no. 2,pp. 665-678, June, 2018.   DOI
9 Xiaofei Wang, Min Chen, T. Taleb, A. Ksentini, and V. Leung, "Cache in the air: exploiting content caching and delivery techniques for 5G systems," IEEE Communications Magazine, vol. 52, no. 2, pp. 131-139, February, 2014.   DOI
10 G. Paschos, E. Bastug, I. Land, G. Caire and M. Debbah, "Wireless caching: technical misconceptions and business barriers," IEEE Communications Magazine, vol. 54, no. 8, pp. 16-22, August, 2016.   DOI
11 H. Park, I. Widjaja, and H. Lee, "Detection of cache pollution attacks using randomness checks," In Proc. of IEEE International Conference on Communications (ICC), pp. 1096-1100, 10-15 June, 2012.
12 R. Tourani, S. Misra, T. Mick and G. Panwar, "Security, Privacy, and Access Control in Information-Centric Networking: A Survey," IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 566-600, First quarter, 2018.   DOI
13 M. Xie, I. Widjaja, and H. Wang, "Enhancing cache robustness for content-centric networking," in Proc. of IEEE INFOCOM, pp. 2426-2434, 25-30 March, 2012.
14 A. Karami and M. Guerrero-Zapata, "An anfis-based cache replacement method for mitigating cache pollution attacks in named data," Networking Computer Networks, vol. 80, pp. 51-65, 7 April, 2015.   DOI
15 M. Conti, P. Gasti, and M. Teoli, "A lightweight mechanism for detection of cache pollution attacks in named data networking," Computer Networks, vol. 57, no. 16, pp. 3178-3191, 13 November, 2013.   DOI
16 G. Mauri, R. Raspadori, M. Gerlay, and G. Verticale, "Exploiting information centric networking to build an attacker-controlled content delivery network," in Proc. of 14th Annual Mediterranean Ad Hoc Networking Workshop, pp. 1-6, 17-18 June, 2015.
17 W. Chai, D. He, I. Psaras, and G. Pavlou, "Cache 'less for more' in information-centric networks," in Proc. of the 11th International IFIP TC 6 Conference on Networking, pp. 27-40, May 2012.
18 L. Breslau, P. Cue, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and zipf-like distributions: Evidence and implications," in Proc. of IEEE Conference on Computer Communications (INFOCOM), pp. 126-134, 1999.
19 K. Cho, M. Lee, K. Park, T. Kwon, Y. Choi, and S. Pack, "Wave: Popularity-based and collaborative in-network caching for content oriented networks," in Proc. of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 316-321, 2012.
20 S. Lim, B. Ko, and G. Jung, "Inter-Chunk Popularity-Based Edge-First Caching in Content-Centric Networking," IEEE Communications Letters, vol. 18, no. 8, pp. 1331-1334, 2014.   DOI
21 A. Mahanti, C. Williamson, and D. Eager, "Traffic analysis of a web proxy caching hierarchy," IEEE Network, vol. 14, no. 3, pp. 16-23, 2000.   DOI
22 Hisashi Kobayashi, Brian L. Mark and William Turin, Probability, Random Processes and Statistical Analysis, Cambridge University Press, New York, USA, 2012.
23 Source code for nwEPC-EPC SAE Gateway. https://sourceforge.net/projects/nwepc
24 Source code for CCNx. www.ccnx.org.
25 D. R. Cheriton and M. Gritter, "Triad: A scalable deployable NAT-based internet architecture," Technical Report, Stanford University, January, 2000.
26 G. Xylomenos, C. N. Ververidis, V. A. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K. Katsaros, and G. Polyzos, "A survey of information-centric networking research," IEEE Communications Surveys and Tutorials, vol. 16, no. 2, pp. 1024-1049, 2014.   DOI