The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Evaluating content management techniques for Web proxy caches
ACM SIGMETRICS Performance Evaluation Review
Improving Proxy Cache Performance: Analysis of Three Replacement Policies
IEEE Internet Computing
On realistic network topologies for simulation
MoMeTools '03 Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research
A survey of Web cache replacement strategies
ACM Computing Surveys (CSUR)
The LCD interconnection of LRU caches and its analysis
Performance Evaluation
Measurements, analysis, and modeling of BitTorrent-like systems
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Does internet media traffic really follow Zipf-like distribution?
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
IEEE Transactions on Parallel and Distributed Systems
Pollution attacks and defenses for Internet caching systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
The stretched exponential distribution of internet media access patterns
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Power-law revisited: large scale measurement study of P2P content popularity
IPTPS'10 Proceedings of the 9th international conference on Peer-to-peer systems
A learning-based approach for IP geolocation
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
An overview of web caching replacement algorithms
IEEE Communications Surveys & Tutorials
Cache "less for more" in information-centric networks
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Cache Privacy in Named-Data Networking
ICDCS '13 Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems
Hi-index | 0.00 |
Content-Centric Networking (CCN) is an emerging paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content - rather than addressable hosts - becomes a first-class entity. Content is therefore decoupled from its location. This allows, among other things, the implementation of ubiquitous caching. Named-Data Networking (NDN) is a prominent example of CCN. In NDN, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. This makes NDN a good architecture for efficient large scale content distribution. However, reliance on caching allows an adversary to perform attacks that are very effective and relatively easy to implement. Such attacks include cache poisoning (i.e., introducing malicious content into caches) and cache pollution (i.e., disrupting cache locality). This paper focuses on cache pollution attacks, where the adversary's goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers. We show, via simulations, that such attacks can be implemented in NDN using limited resources, and that their effectiveness is not limited to small topologies. We then illustrate that existing proactive countermeasures are ineffective against realistic adversaries. Finally, we introduce a new technique for detecting pollution attacks. Our technique detects high and low rate attacks on different topologies with high accuracy.