Font Size: a A A

An Anti-pollution-Attack Algorithm Based On Path Diversity In Named Data Networking

Posted on:2018-07-13Degree:MasterType:Thesis
Country:ChinaCandidate:H R GuoFull Text:PDF
GTID:2348330512986728Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the vigorous expansion of the Internet,the content of the network information shows explosive growth trend,the demand for the network is no longer the communication from hosts to hosts.Information has become the most principal part on the Internet.In order to solve the problems of the current Internet such as complexity,scalability and security,researchers proposed the revolutionary future network architecture.without traditional TCP/IP.Information-centric Networking(ICN)is proposed as an encouraging direction for the future network architecture.Among them,Named Data Networking(NDN)is the most significant instance of the burgeoning Information-centric Networking architectures.However,the in-network caching mechanism of NDN is susceptible to different forms of attacks.In this paper,we address on the false-locality pollution attack,where an attacker constantly requests a large quantity of unwelcome data objects to comsume the valuable cache resources on the router in NDN,and ultimately reduce general users' hit ratio.In this paper,an integrated model to profile an attackers's strategy for attacking an NDN network is proposed.Simulation experiments show that such a false-locality pollution attack launched with limited resources can cause a sufficiently great damage on the NDN network.In order to identify and reduce the harm of this type of attack,we devise a brand new algorithm that creatively takes advantage of the diversity of the network traversing routes within an Internet Service Provider's point-of-presence(PoP)network.The rational of the algorithm is theoretically analyzed.In the meanwhile,we implement the algorithm on NDN router with two low-cost methods.Experimental results show that the proposed algorithm is able to hava a significant achievement in impeding the false-locality pollution.Finally,we also consider about the conspiracy that attckers may propose against our anti-pollution algorithm and prove that they are invalid and infeasible.
Keywords/Search Tags:Named Data Networking, Cache pollution attack, Network security
PDF Full Text Request
Related items