A Detection and Defense Approach for Content Privacy in Named Data Network
Title | A Detection and Defense Approach for Content Privacy in Named Data Network |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Dogruluk, Ertugrul, Costa, Antonio, Macedo, Joaquim |
Conference Name | 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) |
Date Published | jun |
Publisher | IEEE |
ISBN Number | 978-1-7281-1542-9 |
Keywords | attack detection, brute force attack model, brute force timing attack, cache storage, Cathode ray tubes, computer network security, consumer privacy, content privacy, countermeasure methods, cryptography, data privacy, delays, Internet, IP networks, named data network, Named Data Network Security, NDN, privacy, pubcrawl, resilience, Resiliency, Scalability, side-channel timing attack, side-channel timing response, signature based defense, telecommunication channels, telecommunication network routing, telecommunication network topology, Tools |
Abstract | The Named Data Network (NDN) is a promising network paradigm for content distribution based on caching. However, it may put consumer privacy at risk, as the adversary may identify the content, the name and the signature (namely a certificate) through side-channel timing responses from the cache of the routers. The adversary may identify the content name and the consumer node by distinguishing between cached and un- cached contents. In order to mitigate the timing attack, effective countermeasure methods have been proposed by other authors, such as random caching, random freshness, and probabilistic caching. In this work, we have implemented a timing attack scenario to evaluate the efficiency of these countermeasures and to demonstrate how the adversary can be detected. For this goal, a brute force timing attack scenario based on a real topology was developed, which is the first brute force attack model applied in NDN. Results show that the adversary nodes can be effectively distinguished from other legitimate consumers during the attack period. It is also proposed a multi-level mechanism to detect an adversary node. Through this approach, the content distribution performance can be mitigated against the attack. |
URL | https://ieeexplore.ieee.org/document/8763835 |
DOI | 10.1109/NTMS.2019.8763835 |
Citation Key | dogruluk_detection_2019 |
- named data network
- tools
- telecommunication network topology
- telecommunication network routing
- telecommunication channels
- signature based defense
- side-channel timing response
- side-channel timing attack
- Scalability
- Resiliency
- resilience
- pubcrawl
- privacy
- NDN
- Named Data Network Security
- Attack detection
- IP networks
- internet
- delays
- data privacy
- Cryptography
- countermeasure methods
- content privacy
- consumer privacy
- computer network security
- Cathode ray tubes
- cache storage
- brute force timing attack
- brute force attack model