Ioanna Angeliki Kapetanidou, Stavros Malagaris, V. Tsaoussidis
{"title":"避免臭名昭著的内容来源:一种内容中毒攻击缓解方法","authors":"Ioanna Angeliki Kapetanidou, Stavros Malagaris, V. Tsaoussidis","doi":"10.1109/ISCC55528.2022.9912936","DOIUrl":null,"url":null,"abstract":"Named Data Networking (NDN) has emerged as a promising Future Internet architecture. NDN provisions security by design and guarantees that data packets are immutable and authentic. Nevertheless, its inherent in-network caching feature has opened the door to new types of security attacks. One such critical security issue in NDN is content poisoning attacks. In content poisoning, the attacker aims at injecting poisonous (i.e., fake or invalid) content in the network caches. In this paper, we propose a reputation-based content poisoning mitigation model, which assists both the access and the core network nodes in identifying the sources from which poisonous content is originated, and subsequently, limiting the Interest flow towards those notorious sources as well as in avoiding caching poisonous content.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach\",\"authors\":\"Ioanna Angeliki Kapetanidou, Stavros Malagaris, V. Tsaoussidis\",\"doi\":\"10.1109/ISCC55528.2022.9912936\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Named Data Networking (NDN) has emerged as a promising Future Internet architecture. NDN provisions security by design and guarantees that data packets are immutable and authentic. Nevertheless, its inherent in-network caching feature has opened the door to new types of security attacks. One such critical security issue in NDN is content poisoning attacks. In content poisoning, the attacker aims at injecting poisonous (i.e., fake or invalid) content in the network caches. In this paper, we propose a reputation-based content poisoning mitigation model, which assists both the access and the core network nodes in identifying the sources from which poisonous content is originated, and subsequently, limiting the Interest flow towards those notorious sources as well as in avoiding caching poisonous content.\",\"PeriodicalId\":309606,\"journal\":{\"name\":\"2022 IEEE Symposium on Computers and Communications (ISCC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Symposium on Computers and Communications (ISCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC55528.2022.9912936\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Symposium on Computers and Communications (ISCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC55528.2022.9912936","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach
Named Data Networking (NDN) has emerged as a promising Future Internet architecture. NDN provisions security by design and guarantees that data packets are immutable and authentic. Nevertheless, its inherent in-network caching feature has opened the door to new types of security attacks. One such critical security issue in NDN is content poisoning attacks. In content poisoning, the attacker aims at injecting poisonous (i.e., fake or invalid) content in the network caches. In this paper, we propose a reputation-based content poisoning mitigation model, which assists both the access and the core network nodes in identifying the sources from which poisonous content is originated, and subsequently, limiting the Interest flow towards those notorious sources as well as in avoiding caching poisonous content.