Analyzing the producer-consumer collusion attack in Content-Centric Networks

This paper evaluates a denial-of-service attack in Content Centric Networks (CCN) that aims at increasing the content retrieval time. In this attack, malicious consumers and producers collude by generating content and changing content popularity. Malicious contents are stored by nodes and occupy the cache space that should be occupied by legitimate contents. Thus, the probability of legitimate consumers retrieves contents directly from the producer increases as well as the content retrieval time. We evaluate the impact of the attack by varying the number of consumers in collusion, the interest packets rate, and the way contents are requested. Results show if 20% of consumers are malicious and send 500 interests/s each, the content retrieval time experienced by legitimate users increases by 20 times.

[1]  Deborah Estrin,et al.  Named Data Networking (NDN) Project , 2010 .

[2]  Gene Tsudik,et al.  DoS and DDoS in Named Data Networking , 2012, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[3]  Mengjun Xie,et al.  Enhancing cache robustness for content-centric networking , 2012, 2012 Proceedings IEEE INFOCOM.

[4]  Li Fan,et al.  Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[5]  Igor M. Moraes,et al.  Information-Centric Networks: A New Paradigm for the Internet , 2013 .

[6]  Mauro Conti,et al.  A lightweight mechanism for detection of cache pollution attacks in Named Data Networking , 2013, Comput. Networks.

[7]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[8]  V. Jacobson,et al.  Securing Network Content , 2009 .

[9]  Hossam S. Hassanein,et al.  A Survey of Security Attacks in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.

[10]  Priya Mahadevan,et al.  Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.