Interest Flooding Attack Countermeasures Assessment on Content Centric Networking

Content Centric Networking (CCN) has introduced new concepts and ideas in the next generation routing protocols research area, proposing an alternative approach to the well known and consolidated TCP/IP protocol suite. CCN envisions a network of smart caching devices that not only transport bits from one place to another but also support the network to provide end users with what they are really interested in: named data. However, while a large portion of the existing literature highlights the benefits of this new network paradigm, we focus on some specific security issues related to the opportunity of mounting distributed denial of service attacks, commonly known as Interest Flooding Attack (IFA). Our results confirm this possibility and assess the behavior of state of the art tools designed to mitigate this problem. We run different simulation campaigns in a real deployment scenario to support our evaluation.

[1]  Riccardo Sisto,et al.  PIT overload analysis in content centric networks , 2013, ICN '13.

[2]  Hongke Zhang,et al.  Modeling denial‐of‐service against pending interest table in named data networking , 2014, Int. J. Commun. Syst..

[3]  Seongmin Kim,et al.  Threat of DoS by interest flooding attack in content-centric networking , 2013, The International Conference on Information Networking 2013 (ICOIN).

[4]  Priya Mahadevan,et al.  Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.

[5]  Gene Tsudik,et al.  DoS and DDoS in Named Data Networking , 2012, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[6]  Thomas C. Schmidt,et al.  Backscatter from the data plane - Threats to stability and security in information-centric network infrastructure , 2012, Comput. Networks.

[7]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[8]  Mauro Conti,et al.  Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[9]  Diego Perino,et al.  A reality check for content centric networking , 2011, ICN '11.

[10]  Bin Liu,et al.  Mitigate DDoS attacks in NDN by interest traceback , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).