Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Inferring link weights using end-to-end measurements
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Measurements, analysis, and modeling of BitTorrent-like systems
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Denial of service via algorithmic complexity attacks
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
An architecture for content routing support in the internet
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
A data-oriented (and beyond) network architecture
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
AS-based accountability as a cost-effective DDoS defense
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
LIPSIN: line speed publish/subscribe inter-networking
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Proceedings of the 5th international conference on Emerging networking experiments and technologies
On content-centric router design and implications
Proceedings of the Re-Architecting the Internet Workshop
Secure naming in information-centric networks
Proceedings of the Re-Architecting the Internet Workshop
Bootstrapping accountability in the internet we have
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Naming in content-oriented architectures
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
A reality check for content centric networking
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
Information-centric networking: seeing the forest for the trees
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Distributed denial of service is a scalability problem
ACM SIGCOMM Computer Communication Review
Adaptive forwarding in named data networking
ACM SIGCOMM Computer Communication Review
On the vulnerability of hardware hash tables to sophisticated attacks
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Bulk of interest: performance measurement of content-centric routing
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications
ICDCS '12 Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems
On name-based group communication: Challenges, concepts, and transparent deployment
Computer Communications
Hi-index | 0.00 |
Information-centric networking (ICN) raises data objects to first class routable entities in the network and changes the Internet paradigm from host-centric connectivity to data-oriented delivery. However, current approaches to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, threats to the stability and security of the content distribution system are analyzed in theory, simulations, and practical experiments. We derive relations between state resources and the performance of routers, and demonstrate how this coupling can be misused in practice. We further show how state-based forwarding tends to degrade by decorrelating resources. We identify intrinsic attack vectors present in current content-centric routing, as well as possibilities and limitations to mitigate them. Our overall findings suggest that major architectural refinements are required prior to global ICN deployment in the real world.