Visible to the public A Detection and Defense Approach for Content Privacy in Named Data Network

TitleA Detection and Defense Approach for Content Privacy in Named Data Network
Publication TypeConference Paper
Year of Publication2019
AuthorsDogruluk, Ertugrul, Costa, Antonio, Macedo, Joaquim
Conference Name2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
Date Publishedjun
PublisherIEEE
ISBN Number978-1-7281-1542-9
Keywordsattack detection, brute force attack model, brute force timing attack, cache storage, Cathode ray tubes, computer network security, consumer privacy, content privacy, countermeasure methods, cryptography, data privacy, delays, Internet, IP networks, named data network, Named Data Network Security, NDN, privacy, pubcrawl, resilience, Resiliency, Scalability, side-channel timing attack, side-channel timing response, signature based defense, telecommunication channels, telecommunication network routing, telecommunication network topology, Tools
Abstract

The Named Data Network (NDN) is a promising network paradigm for content distribution based on caching. However, it may put consumer privacy at risk, as the adversary may identify the content, the name and the signature (namely a certificate) through side-channel timing responses from the cache of the routers. The adversary may identify the content name and the consumer node by distinguishing between cached and un- cached contents. In order to mitigate the timing attack, effective countermeasure methods have been proposed by other authors, such as random caching, random freshness, and probabilistic caching. In this work, we have implemented a timing attack scenario to evaluate the efficiency of these countermeasures and to demonstrate how the adversary can be detected. For this goal, a brute force timing attack scenario based on a real topology was developed, which is the first brute force attack model applied in NDN. Results show that the adversary nodes can be effectively distinguished from other legitimate consumers during the attack period. It is also proposed a multi-level mechanism to detect an adversary node. Through this approach, the content distribution performance can be mitigated against the attack.

URLhttps://ieeexplore.ieee.org/document/8763835
DOI10.1109/NTMS.2019.8763835
Citation Keydogruluk_detection_2019