Visible to the public Advanced interest flooding attacks in named-data networking

TitleAdvanced interest flooding attacks in named-data networking
Publication TypeConference Paper
Year of Publication2017
AuthorsSignorello, S., Marchal, S., François, J., Festor, O., State, R.
Conference Name2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)
Keywordsadvanced IFA, advanced interest flooding attacks, clean slate, clean-slate Internet proposal, Collaboration, complete attack model, Computer architecture, Computer crime, computer network security, data-plane, Electronic mail, Human Behavior, human factor, human factors, information-centric networking, Interest Flooding Attack, Internet, Metrics, Monitoring, multicast communication, multicast communications, Named-Data Networking, network infrastructure, policy governance, Policy-Governed Secure Collaboration, pubcrawl, resilience, Resiliency, Robustness, Routing protocols, security of data, specific DDoS attack, telecommunication security, unsatisfiable content requests
Abstract

The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN's data-plane seems to offer many advantages, e.g., native support for multicast communications and flow balance, it also makes the network infrastructure vulnerable to a specific DDoS attack, the Interest Flooding Attack (IFA). In IFAs, a botnet issuing unsatisfiable content requests can be set up effortlessly to exhaust routers' resources and cause a severe performance drop to legitimate users. So far several countermeasures have addressed this security threat, however, their efficacy was proved by means of simplistic assumptions on the attack model. Therefore, we propose a more complete attack model and design an advanced IFA. We show the efficiency of our novel attack scheme by extensively assessing some of the state-of-the-art countermeasures. Further, we release the software to perform this attack as open source tool to help design future more robust defense mechanisms.

URLhttp://ieeexplore.ieee.org/document/8171325/
DOI10.1109/NCA.2017.8171325
Citation Keysignorello_advanced_2017