Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.1.155

A Study on Fake Data Filtering Method of CCN  

Kim, DaeYoub (Suwon University)
Abstract
To enhance network efficiency, content-centric networking (CCN) proposes that intermediated network nodes on a content-delivery path temporally cache transmitted contents. Then if an intermediated node receives a content request message (Interest) for previously cached content, the node directly transmits the cached content as a response message (Data) to requestors and finishes the transmission of the received Interest. Since Interest is performed by intermediated network nodes, it is possible to efficiently transmit contents and to effectively solve a network congestion problem caused around contents sources. For that, CCN utilizes both content store to temporarily cache content and pending Interest table (PIT) to record Interest incoming Face. However, it has mentioned the possibility of denial service attack using both the limitation of PIT resource and fake Interests. In this paper, we briefly describe the presented PIT flooding attack utilizing fake Interest. Then we introduce new attack possibility using fake Data and propose a countermeasure for the proposed attack. Also we evaluate the performance of our proposal.
Keywords
Future Internet; CCN; DoS/DDoS Attack; Attack Detection;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D. Kim, "Content Centric Networking Naming Scheme for Efficient Data Sharing," Journal of Korea Multimedia Society, Vol. 15, No. 9, September 2012, pp. 1126-1132.   과학기술학회마을   DOI   ScienceOn
2 K. Cho, M. Lee, K. Park, T. Kwon, Y. Choi and S. Pack, "WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks," in Proc. IEEE INFOCOM Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN), March 2012.
3 M. Xie, I. Widjaja and H. Wang, "Enhancing cache rebustness for content-centric networks," in: Infocom, 2012.
4 M. Conti, P. Gasti and M. Teoli, "A lightweight mechanism for detection of cache pollution att만 in Named Data Networking," Computer Networks, 57, PP 3178-3191, 2013.   DOI
5 D.D. Clark, "The Design Philosophy of the DARPA Internet Protocols," ACM Sigcomm Comp. Comm. Review, Vol. 18, No. 1, pp. 106- 114, Aug. 1988.   DOI
6 B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher and B. Ohlmann, "A Survey of Information-Centric Networking," IEEE Communications Magazine, Vol. 50, No. 7, pp. 26-36, July 2012.
7 V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs and R. Braynard, "Networking Named Content," 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1-12, 2009.
8 The NDN project team, Named Data Networking (NDN) Project, NDN technical Report NDO-0001, 2010.
9 C. Park, T. Kwon and Y. Choi, "Scalability Problem for Interest Diffusion in Content- Centric Network," NCS, Dec. 2010.
10 D. Kim, J. Lee, "How to Make Content Centric Network (CCN) More Robust Against DoS/DDoS Attack," IEICE Trans. Commun. Vol. E96-B, No. 1, PP 313-316, January 2013.   DOI
11 D. Kim, "A Study on Countermeasure for CCN Interest Flooding Attack," Journal of Korea Multimedia Society, Vol. 16, No. 8, August 2013, pp. 954-961.   과학기술학회마을   DOI