Visible to the public Risk analysis of information-leakage through interest packets in NDN

TitleRisk analysis of information-leakage through interest packets in NDN
Publication TypeConference Paper
Year of Publication2017
AuthorsKondo, D., Silverston, T., Tode, H., Asami, T., Perrin, O.
Conference Name2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
PublisherIEEE
ISBN Number978-1-5386-2784-6
Keywordsanomalous Interest traffic, computer network security, Dictionaries, encoding, Human Behavior, information-leakage, Interest names, interest packets, Internet, invasive software, IP, IP networks, Malware, Named Data Network Security, Named-Data Networking, NDN network, paper performs risk analysis, pubcrawl, resilience, Resiliency, Scalability, search engine information, search engines, security, Support vector machines
Abstract

Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN), Interest names introduce novel vulnerabilities that can be exploited. By setting up a malware, Interest names can be used to encode critical information (steganography embedded) and to leak information out of the network by generating anomalous Interest traffic. This security threat based on Interest names does not exist in IP network, and it is essential to solve this issue to secure the NDN architecture. This paper performs risk analysis of information-leakage in NDN. We first describe vulnerabilities with Interest names and, as countermeasures, we propose a name-based filter using search engine information, and another filter using one-class Support Vector Machine (SVM). We collected URLs from the data repository provided by Common Crawl and we evaluate the performances of our per-packet filters. We show that our filters can choke drastically the throughput of information-leakage, which makes it easier to detect anomalous Interest traffic. It is therefore possible to mitigate information-leakage in NDN network and it is a strong incentive for future deployment of this architecture at the Internet scale.

URLhttps://ieeexplore.ieee.org/document/8116403/
DOI10.1109/INFCOMW.2017.8116403
Citation Keykondo_risk_2017