An optimal statistical test for robust detection against interest flooding attacks in CCN

Confronting the changing demand of users, the current Internet is revealing its limitations. Information Centric Network (ICN) are Future Internet proposals which are based on named data objects. In order to actually replace its predecessor, ICN must be able to resist existent threats in the current Internet, especially the Denial of Service (DoS) attack. In this paper, we focus on Interest flooding - a new type of DoS attack in Content Centric Network (CCN). Several solutions for this threat have been introduced, but they do not solve the problem in a satisfying way because of some drawbacks in either their detection performance, scalability support or restricted scenario of usage. Our goal is to design a reliable, low resources-consuming detection method against Interest flooding attack in CCN. A detection scheme must be attended since a lot of resources consumed by unnecessarily continuous countermeasure can be saved by a dependable detector. Like no other detectors in proposed solutions, our detector is based on statistical hypotheses testing theory. The achieved result is a low resources-consuming detector that can be deployed globally on each CCN router. The false alarm probability of our detector can be controlled at will. Its statistical power can be theoretically established and evaluated precisely. To validate our contribution, numerical results show the relevance of the proposed approach and the sharpness of theoretical results.

[1]  Bin Liu,et al.  Mitigate DDoS attacks in NDN by interest traceback , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[2]  Mauro Conti,et al.  Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[3]  B. Melamed,et al.  Traffic modeling for telecommunications networks , 1994, IEEE Communications Magazine.

[4]  Stephen E. Fienberg,et al.  Testing Statistical Hypotheses , 2005 .

[5]  Gene Tsudik,et al.  DoS and DDoS in Named Data Networking , 2012, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[6]  Nikos Fotiou,et al.  A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.

[7]  Deborah Estrin,et al.  Named Data Networking (NDN) Project , 2010 .

[8]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.

[9]  Sasu Tarkoma,et al.  The Publish/Subscribe Internet Routing Paradigm (PSIRP): Designing the Future Internet Architecture , 2009, Future Internet Assembly.

[10]  Thomas Engel,et al.  A semantic firewall for Content-Centric Networking , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[11]  Tobias Lauinger,et al.  Security & Scalability of Content-Centric Networking , 2010 .

[12]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[13]  Stephen Farrell,et al.  Network of Information (NetInf) - An information-centric networking architecture , 2013, Comput. Commun..

[14]  Luciano Lavagno,et al.  A key management scheme for Content Centric Networking , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[15]  Jianqiang Tang,et al.  Identifying Interest Flooding in Named Data Networking , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[16]  Priya Mahadevan,et al.  Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.

[17]  Bengt Ahlgren,et al.  A survey of information-centric networking , 2012, IEEE Communications Magazine.