Interest flow control method based on user reputation and content name prefixes in named data networking

Sayaka Umeda, Takashi Kamimoto, Yuri Ohata, Hiroshi Shigeno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Interest Flooding Attack (IFA) is a big problem in Named Data Networking (NDN). In IFA, an attacker repeats sending an excessive number of Interest packets requesting non-existing contents within short time in order to overload the network. It causes service disruptions for normal users. Pushback mechanism is a representative countermeasure against IFA in NDN. However, the mechanism also limits Interests from normal users, because it controls the flow in all routers affected by IFA. In addition, they assume only simple constant attack model in NDN. As a result, the data acquisition of normal users decreases. In this paper, we propose an Interest flow control method based on user reputation and content name prefixes in Named Data Networking, called ICRP. In ICRP, an edge router limits only Interests from malicious users who are attackers by user reputation. Here, reputation is the value that means the transmission degree of Interest requiring existing contents. As the reputation reflects the past behavior of each user, ICRP considers malicious users change their behavior. Furthermore, the edge router reduces the number of malicious Interests by content name prefixes. The edge router makes a blacklist of non-existing name prefixes requested by the detected malicious users. We evaluate ICRP by simulation. We confirm that ICRP can suppress the limitation to Interests from normal users. Furthermore, ICRP can alleviate the fluctuation the data acquisition rate of normal users even if malicious users change their behavior.

Original languageEnglish
Title of host publicationProceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages710-717
Number of pages8
Volume1
ISBN (Print)9781467379519
DOIs
Publication statusPublished - 2015 Dec 2
Event14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015 - Helsinki, Finland
Duration: 2015 Aug 202015 Aug 22

Other

Other14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
Country/TerritoryFinland
CityHelsinki
Period15/8/2015/8/22

Keywords

  • Interest Flooding Attack
  • Name Prefix
  • Named Data Networking
  • On-off attack
  • Reputation

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Interest flow control method based on user reputation and content name prefixes in named data networking'. Together they form a unique fingerprint.

Cite this