Interest flooding attack and countermeasures in Named Data Networking

Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet, where packets from a large number of compromised hosts thwart the paths to the victim site and/or overload the victim machines. In a newly proposed future Internet architecture, Named Data Networking (NDN),...

Full description

Saved in:
Bibliographic Details
Published in2013 IFIP Networking Conference pp. 1 - 9
Main Authors Afanasyev, Alexander, Mahadevan, Priya, Moiseenko, Ilya, Uzun, Ersin, Lixia Zhang
Format Conference Proceeding
LanguageEnglish
Published IFIP 01.05.2013
Subjects
Online AccessGet full text

Cover

Abstract Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet, where packets from a large number of compromised hosts thwart the paths to the victim site and/or overload the victim machines. In a newly proposed future Internet architecture, Named Data Networking (NDN), end users request desired data by sending Interest packets, and the network delivers Data packets upon request only, effectively eliminating many existing DDoS attacks. However, an NDN network can be subject to a new type of DDoS attack, namely Interest packet flooding. In this paper we investigate effective solutions to mitigate Interest flooding. We show that NDN's inherent properties of storing per packet state on each router and maintaining flow balance (i.e., one Interest packet retrieves at most one Data packet) provides the basis for effective DDoS mitigation algorithms. Our evaluation through simulations shows that the solution can quickly and effectively respond and mitigate Interest flooding.
AbstractList Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet, where packets from a large number of compromised hosts thwart the paths to the victim site and/or overload the victim machines. In a newly proposed future Internet architecture, Named Data Networking (NDN), end users request desired data by sending Interest packets, and the network delivers Data packets upon request only, effectively eliminating many existing DDoS attacks. However, an NDN network can be subject to a new type of DDoS attack, namely Interest packet flooding. In this paper we investigate effective solutions to mitigate Interest flooding. We show that NDN's inherent properties of storing per packet state on each router and maintaining flow balance (i.e., one Interest packet retrieves at most one Data packet) provides the basis for effective DDoS mitigation algorithms. Our evaluation through simulations shows that the solution can quickly and effectively respond and mitigate Interest flooding.
Author Afanasyev, Alexander
Moiseenko, Ilya
Mahadevan, Priya
Uzun, Ersin
Lixia Zhang
Author_xml – sequence: 1
  givenname: Alexander
  surname: Afanasyev
  fullname: Afanasyev, Alexander
  email: afanasev@cs.ucla.edu
  organization: Univ. of California, Los Angeles, Los Angeles, CA, USA
– sequence: 2
  givenname: Priya
  surname: Mahadevan
  fullname: Mahadevan, Priya
  email: ersin.uzun@parc.com
  organization: Palo Alto Res. Center, Palo Alto, CA, USA
– sequence: 3
  givenname: Ilya
  surname: Moiseenko
  fullname: Moiseenko, Ilya
  email: iliamo@cs.ucla.edu
  organization: Univ. of California, Los Angeles, Los Angeles, CA, USA
– sequence: 4
  givenname: Ersin
  surname: Uzun
  fullname: Uzun, Ersin
  email: priya.mahadevan@parc.com
  organization: Palo Alto Res. Center, Palo Alto, CA, USA
– sequence: 5
  surname: Lixia Zhang
  fullname: Lixia Zhang
  email: lixia@cs.ucla.edu
  organization: Univ. of California, Los Angeles, Los Angeles, CA, USA
BookMark eNotj89KAzEYxFNQqK19Ai95gYX8cbPJsdSqhVIvvZcvyRcJ7SZlkyK-vRFlDnOY3wzMgtylnHBGFtIwrrXoezknq1KiZUIN6pkr-UC2u1RxwlJpuOTsY_qkUCu4M4Xkqcu333hEKLcG0ZjoAUb09AUq0APWrzydW-eR3Ae4FFz9-5IcX7fHzXu3_3jbbdb7LhpWO2G5M8E6HMSgwTnLvdLOgA2eBTX4Ju0lU4Z7yxigASkENr73wgrgckme_mYjIp6uUxxh-j4ppWTfzvwAcUhHdg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 3901882553
9783901882555
EndPage 9
ExternalDocumentID 6663516
Genre orig-research
GroupedDBID 6IE
6IL
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i90t-2b1c9fbce7278accb1d68c9abfd0f67d7d78d30691db00ae9a322ebce5d2b2a13
IEDL.DBID RIE
IngestDate Wed Dec 20 05:18:46 EST 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-2b1c9fbce7278accb1d68c9abfd0f67d7d78d30691db00ae9a322ebce5d2b2a13
PageCount 9
ParticipantIDs ieee_primary_6663516
PublicationCentury 2000
PublicationDate 2013-May
PublicationDateYYYYMMDD 2013-05-01
PublicationDate_xml – month: 05
  year: 2013
  text: 2013-May
PublicationDecade 2010
PublicationTitle 2013 IFIP Networking Conference
PublicationTitleAbbrev IFIPNetworking
PublicationYear 2013
Publisher IFIP
Publisher_xml – name: IFIP
SSID ssib026764163
Score 1.9856275
Snippet Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet, where packets from a large number of compromised hosts thwart the...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Algorithm design and analysis
Computer crime
denial-of-service
Information-centric networks
Internet
IP networks
named-data networking
Routing protocols
YouTube
Title Interest flooding attack and countermeasures in Named Data Networking
URI https://ieeexplore.ieee.org/document/6663516
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELXaTkyAWsS3PDCSUiepY8_QqkKiYihSt-psn6WqUorAXfj1PTttEYgBebHsJFYc-9758u6OsbshyV0n6VgycMJnJRaQQWWKzClLYK-xUC5F-5zKyVv5PB_OW-z-4AuDiIl8hv1YTf_y3dpuoqnsQUZ4FLLN2lWlG1-t_drJZSWjbvEjSUrCiPExe9k_vaGGrPqbYPr261fgxf8Of8J63954_PWAM6eshXWXjZIpj0Q695F6Th0cQgC74lA7njJAkMxtDICffFnzKRDu8ScIwKcN9Zvu6bHZeDR7nGS7lAjZUg9ClhthtTcWSetQYK0RTiqrwXg38LJyVJSjQ4AWjrYToAbar0jXD11uchDFGevU6xrPGXcorDFaeG-q0iqplTFgS6OwJIW7lBesG2dg8d4EvVjsXv7y7-YrdpSnPBGRCXjNOuFjgzeE1sHcps-0BQ6InAk
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMsAEqEW88cBISp2HY8_QqkAbMRSpW-VXpKpSisBZ-PWcnbYIxICyWHnJTuz77s7f3QHcZCh3DUOzpG9oGaU2kZHMVRIZrhHshU24Cdk-CzZ6TZ9m2awFt9tYGGttIJ_Znm-GvXyz0rV3ld0xD4-U7cBuhlZF3kRrbWZPzHLmtYsfZVICSgwPYLJ5f0MOWfZqp3r681fqxf924BC63_F45GWLNEfQslUHBsGZh0KdlJ58jheIdE7qJZGVIaEGBErdxgX4QRYVKSQiH3mQTpKiIX_jM12YDgfT-1G0LooQLUTfRbGiWpRKW9Q7uNRaUcO4FlKVpl-y3ODBDZoBghpcUNIKiSvW4v2ZiVUsaXIM7WpV2RMgxlKtlKBlqfJUcya4UlKnitsUVe6UnULHf4H5W5P2Yr4e_Nnfp69hbzSdjOfjx-L5HPbjUDXC8wIvoO3ea3uJ2O3UVfhlX2xpn1o
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+IFIP+Networking+Conference&rft.atitle=Interest+flooding+attack+and+countermeasures+in+Named+Data+Networking&rft.au=Afanasyev%2C+Alexander&rft.au=Mahadevan%2C+Priya&rft.au=Moiseenko%2C+Ilya&rft.au=Uzun%2C+Ersin&rft.date=2013-05-01&rft.pub=IFIP&rft.spage=1&rft.epage=9&rft.externalDocID=6663516