Biblio
Named Data Networking (NDN) is one of the most promising data-centric networks. NDN is resilient to most of the attacks that are possible in TCP/IP stack. Since NDN has different network architecture than TCP/IP, so it is prone to new types of attack. These attacks are Interest Flooding Attack (IFA), Cache Privacy Attack, Cache Pollution Attack, Content Poisoning Attack, etc. In this paper, we discussed the detection of IFA. First, we model the IFA on linear topology using the ndnSIM and CCNx code base. We have selected most promising feature among all considered features then we applied diïňĂerent machine learning techniques to detect the attack. We have shown that result of attack detection in case of simulation and implementation is almost same. We modeled IFA on DFN topology and compared the results of different machine learning approaches.
The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN's data-plane seems to offer many advantages, e.g., native support for multicast communications and flow balance, it also makes the network infrastructure vulnerable to a specific DDoS attack, the Interest Flooding Attack (IFA). In IFAs, a botnet issuing unsatisfiable content requests can be set up effortlessly to exhaust routers' resources and cause a severe performance drop to legitimate users. So far several countermeasures have addressed this security threat, however, their efficacy was proved by means of simplistic assumptions on the attack model. Therefore, we propose a more complete attack model and design an advanced IFA. We show the efficiency of our novel attack scheme by extensively assessing some of the state-of-the-art countermeasures. Further, we release the software to perform this attack as open source tool to help design future more robust defense mechanisms.