基于区块链的信息中心网络缓存攻击:实验评估

Swapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, M. Chatterjee
{"title":"基于区块链的信息中心网络缓存攻击:实验评估","authors":"Swapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, M. Chatterjee","doi":"10.1145/3288599.3288640","DOIUrl":null,"url":null,"abstract":"Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Cache attacks on blockchain based information centric networks: an experimental evaluation\",\"authors\":\"Swapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, M. Chatterjee\",\"doi\":\"10.1145/3288599.3288640\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.\",\"PeriodicalId\":346177,\"journal\":{\"name\":\"Proceedings of the 20th International Conference on Distributed Computing and Networking\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 20th International Conference on Distributed Computing and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3288599.3288640\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 20th International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3288599.3288640","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

由于越来越多的网络攻击,保护和保护驻留在互联网上不同主机上的数据变得比以往任何时候都更加重要。虽然已经有一些关于拒绝服务和缓存攻击的研究,但这些研究主要是基于对真实网络攻击的模拟和调查,仍然缺乏。在本文中,我们实验研究了缓存攻击对基于区块链的信息中心网络的影响。我们使用超级账本结构来实现中小型网络的区块链。我们实现了缓存攻击,攻击者以不受欢迎的内容为目标缓存,迫使用户从web服务器获取数据。我们尝试了两种不同的拓扑(线性和网状),并考虑了节点上的两种缓存大小。使用了三种缓存替换策略:最近最少使用、随机和先进先出。缓存命中、获取数据所需的时间以及为请求提供服务的跳数都是通过真实的网络流量获得的。在超级分类账结构框架上,我们实现了两种类型的请求,并展示了查询延迟、调用延迟和更新延迟如何随时间变化。根据我们的研究结果,我们发现大多数以信息为中心的网络,包括基于区块链的网络,都容易受到缓存攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cache attacks on blockchain based information centric networks: an experimental evaluation
Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信