Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions

Published:15 December 2022Publication History
Skip Abstract Section

Abstract

Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a new architecture come new threats, and NDN is no exception. NDN is a potential target for new network attacks such as Interest Flooding Attacks (IFAs). Attackers take advantage of IFA to launch (D)DoS attacks in NDN. Many IFA detection and mitigation solutions have been proposed in the literature. However, there is no comprehensive review study of these solutions that has been proposed so far. Therefore, in this article, we propose a survey of the various IFAs with a detailed comparative study of all the relevant proposed solutions as counter-measures against IFAs. We also review the requirements for a complete and efficient IFA solution and pinpoint the various issues encountered by IFA detection and mitigation mechanisms through a series of attack scenarios. Finally, in this survey, we offer an analysis of the open issues and future research directions regarding IFAs.

REFERENCES

  1. [1] Cisco Visual Networking Index: Forecast and Trends 2018–2023. 2020. Retrieved Oct. 2, 2020, from https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html.Google ScholarGoogle Scholar
  2. [2] NDN Data Packet. 2020. Retrieved Oct. 3, 2020, from https://named-data.net/doc/NDN-packet-spec/current/data.html.Google ScholarGoogle Scholar
  3. [3] NDN Packet Format Specification version 0.3. 2020. Retrieved Sept. 17, 2020, from https://named-data.net/doc/NDN-packet-spec/current/interest.html.Google ScholarGoogle Scholar
  4. [4] Signed Interest Packet. 2020. Retrieved Sept. 17, 2020, from https://named-data.net/doc/NDN-packet-spec/current/signed-interest.html.Google ScholarGoogle Scholar
  5. [5] Aamir Muhammad and Zaidi Syed Mustafa Ali. 2015. Denial-of-service in content centric (named data) networking: A tutorial and state-of-the-art survey. Security and Communication Networks 8, 11 (2015), 20372059.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] AbdAllah Eslam G., Hassanein Hossam S., and Zulkernine Mohammad. 2015. A survey of security attacks in information-centric networking. IEEE Communications Surveys & Tutorials 17, 3 (2015), 14411454.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Abraham Hila Ben and Crowley Patrick. 2017. Controlling strategy retransmissions in named data networking. In 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS’17). IEEE, 7081.Google ScholarGoogle Scholar
  8. [8] Afanasyev Alexander, Halderman J. Alex, Ruoti Scott, Seamons Kent, Yu Yingdi, Zappala Daniel, and Zhang Lixia. 2016. Content-based security for the web. In Proceedings of the 2016 New Security Paradigms Workshop (NSPW’16). 4960.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Afanasyev Alexander, Jiang Xiaoke, Yu Yingdi, Tan Jiewen, Xia Yumin, Mankin Allison, and Zhang Lixia. 2017. NDNS: A DNS-like name service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN’17). IEEE, 19.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Afanasyev Alexander, Mahadevan Priya, Moiseenko Ilya, Uzun Ersin, and Zhang Lixia. 2013. Interest flooding attack and countermeasures in named data networking. In 2013 IFIP Networking Conference (IM’13). IEEE, 19.Google ScholarGoogle Scholar
  11. [11] Ahlgren Bengt, Dannewitz Christian, Imbrenda Claudio, Kutscher Dirk, and Ohlman Borje. 2012. A survey of information-centric networking. IEEE Communications Magazine 50, 7 (2012), 2636.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Al-Sheikh Samir, Wählisch Matthias, and Schmidt Thomas C.. 2015. Revisiting countermeasures against NDN interest flooding. In Proceedings of the 2nd ACM Conference on Information-centric Networking (ACM-ICN’15). 195196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Alhisnawi Mohammad and Ahmadi Mahmood. 2020. Detecting and mitigating DDoS attack in named data networking. Journal of Network and Systems Management (2020), 13431356.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Alston Aubrey and Refaei Tamer. 2016. Neutralizing interest flooding attacks in named data networks using cryptographic route tokens. In 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA’16). IEEE, 8588.Google ScholarGoogle Scholar
  15. [15] Ambrosin Moreno, Compagno Alberto, Conti Mauro, Ghali Cesar, and Tsudik Gene. 2018. Security and privacy analysis of national science foundation future internet architectures. IEEE Communications Surveys & Tutorials 20, 2 (2018), 14181442.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Anand Ashok, Dogar Fahad, Han Dongsu, Li Boyan, Lim Hyeontaek, Machado Michel, Wu Wenfei, Akella Aditya, Andersen David G., Byers John W., Laura Dabbish, Michael Kaminsky, Sara Kiesler, Jon Peha, Adrian Perrig, Srinivasan Seshan, Marvin Sirbu, and Peter Steenkiste. 2011. XIA: An architecture for an evolvable and trustworthy Internet. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X). 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Anderson Tom, Birman Ken, Broberg Robert, Caesar Matthew, Comer Douglas, Cotton Chase, Freedman Michael J., Haeberlen Andreas, Ives Zachary G., Krishnamurthy Arvind, et al. 2013. The Nebula future internet architecture. In The Future Internet Assembly. Springer, 1626.Google ScholarGoogle Scholar
  18. [18] Benarfa Abdelmadjid, Hassan Muhammad, Losiouk Eleonora, Compagno Alberto, Yagoubi Mohamed Bachir, and Conti Mauro. 2020. ChoKIFA+: An early detection and mitigation approach against interest flooding attacks in NDN. International Journal of Information Security 23, 3 (2020), 269–285.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Benarfa Abdelmadjid, Hassan Muhammad, Compagno Alberto, Losiouk Eleonora, Yagoubi Mohamed Bachir, and Conti Mauro. 2019. ChoKIFA: A new detection and mitigation approach against interest flooding attacks in NDN. In International Conference on Wired/Wireless Internet Communication (WWIC’19). Springer, 5365.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Benmoussa Ahmed, Tahari Abdou el Karim, Kerrache Chaker Abdelaziz, Lagraa Nasreddine, Lakas Abderrahmane, Hussain Rasheed, and Ahmad Farhan. 2020. MSIDN: Mitigation of sophisticated interest flooding-based DDoS attacks in named data networking. Future Generation Computer Systems 107 (2020), 293306.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Benmoussa Ahmed, Tahari Abdou el Karim, Lagaa Nasreddine, Lakas Abderrahmane, Ahmad Farhan, Hussain Rasheed, Kerrache Chaker Abdelaziz, and Kurugollu Fatih. 2019. A novel congestion-aware interest flooding attacks detection mechanism in named data networking. In 2019 28th International Conference on Computer Communication and Networks (ICCCN’19). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Buragohain Madhurima and Nandi Sukumar. 2020. Demystifying security on NDN: A survey of existing attacks and open research challenges. In The “Essence” of Network Security: An End-to-End Panorama. Springer, 241261.Google ScholarGoogle Scholar
  23. [23] Cao Jianxun, Pei Dan, Zhang Xiaoping, Zhang Beichuan, and Zhao Youjian. 2016. Fetching popular data from the nearest replica in NDN. In 2016 25th International Conference on Computer Communication and Networks (ICCCN’16). IEEE, 19.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Chan Kevin, Ko Bongjun, Mastorakis Spyridon, Afanasyev Alexander, and Zhang Lixia. 2017. Fuzzy interest forwarding. In Proceedings of the Asian Internet Engineering Conference (AINTEC’17). 3137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Chapin Lyman, Clark Dr. David D., Braden Robert T., Hobby Russ, and Cerf Dr. Vinton G.. 1991. Towards the Future Internet Architecture. RFC 1287. https://rfc-editor.org/rfc/rfc1287.txt.Google ScholarGoogle Scholar
  26. [26] Chen Jing, Xing Guanglin, Cui Mengtian, Huo Hong, and Hou Rui. 2019. Isolation forest based interest flooding attack detection mechanism in NDN. In 2019 2nd International Conference on Hot Information-centric Networking (HotICN’19). IEEE, 5862.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Chen Shuoshuo and Mizero Fabrice. 2015. A survey on security in named data networking. arXiv preprint arXiv:1512.04127 (2015).Google ScholarGoogle Scholar
  28. [28] Cheng Guang, Zhao Lixia, Hu Xiaoyan, Zheng Shaoqi, Wu Hua, Li Ruidong, and Fan Chengyu. 2019. Detecting and mitigating a sophisticated interest flooding attack in NDN from the network-wide view. In 2019 IEEE 1st International Workshop on Network Meets Intelligent Computations (NMIC’19). IEEE, 712.Google ScholarGoogle Scholar
  29. [29] Choi Seungoh, Kim Kwangsoo, Kim Seongmin, and Roh Byeong-hee. 2013. Threat of DoS by interest flooding attack in content-centric networking. In The International Conference on Information Networking 2013 (ICOIN’13). IEEE, 315319.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Compagno Alberto, Conti Mauro, Gasti Paolo, and Tsudik Gene. 2013. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In 38th Annual IEEE Conference on Local Computer Networks (LCN Workshops’13). IEEE, 630638.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Compagno Alberto, Conti Mauro, Ghali Cesar, and Tsudik Gene. 2015. To NACK or not to NACK? Negative acknowledgments in information-centric networking. In 2015 24th International Conference on Computer Communication and Networks (ICCCN’15). IEEE, 110.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Dai Huichen, Wang Yi, Fan Jindou, and Liu Bin. 2013. Mitigate DDoS attacks in NDN by interest traceback. In 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’13). IEEE, 381386.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Din Ikram Ud, Hassan Suhaidi, Khan Muhammad Khurram, Guizani Mohsen, Ghazali Osman, and Habbal Adib. 2017. Caching in information-centric networking: Strategies, challenges, and future research directions. IEEE Communications Surveys & Tutorials 20, 2 (2017), 14431474.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Ding Kun, Liu Yun, Cho Hsin-Hung, Chao Han-Chieh, and Shih Timothy K.. 2016. Cooperative detection and protection for interest flooding attacks in named data networking. International Journal of Communication Systems 29, 13 (2016), 19681980.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Dong Jiaqing, Wang Kai, Quan Wei, and Yin Hao. 2020. InterestFence: Simple but efficient way to counter interest flooding attack. Computers & Security 88 (2020), 101628.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Fotiou Nikos, Nikander Pekka, Trossen Dirk, and Polyzos George C.. 2010. Developing information networking further: From PSIRP to PURSUIT. In International Conference on Broadband Communications, Networks and Systems (BROADNETS’10). Springer, 113.Google ScholarGoogle Scholar
  37. [37] García Gerardo, Beben Andrzej, Ramón Francisco J., Maeso Adrián, Psaras Ioannis, Pavlou George, Wang Ning, Śliwiński Jarosław, Spirou Spiros, Soursos Sergios, et al. 2011. COMET: Content mediator architecture for content-aware networks. In 2011 Future Network & Mobile Summit (FutureNetw’11). IEEE, 18.Google ScholarGoogle Scholar
  38. [38] Gasti Paolo and Tsudik Gene. 2018. Content-centric and named-data networking security: The good, the bad and the rest. In 2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN’18). IEEE, 16.Google ScholarGoogle Scholar
  39. [39] Gasti Paolo, Tsudik Gene, Uzun Ersin, and Zhang Lixia. 2013. DoS and DDoS in named data networking. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN’13). IEEE, 17.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Ghali Cesar, Tsudik Gene, Uzun Ersin, and Wood Christopher A.. 2017. Closing the floodgate with stateless content-centric networking. In 2017 26th International Conference on Computer Communication and Networks (ICCCN’17). IEEE, 110.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Ghasemi Chavoosh, Yousefi Hamed, Shin Kang G., and Zhang Beichuan. 2018. MUCA: New routing for named data networking. In 2018 IFIP Networking Conference (IFIP Networking) and Workshops. IEEE, 289297.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Hou Rui, Han Min, Chen Jing, Hu Wenbin, Tan Xiaobin, Luo Jiangtao, and Ma Maode. 2019. Theil-based countermeasure against interest flooding attacks for named data networks. IEEE Network 33, 3 (2019), 116121.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Jacobson Van, Mosko Marc, Smetters D., and Garcia-Luna-Aceves Jose. 2007. Content-centric networking. Whitepaper, Palo Alto Research Center (2007), 24.Google ScholarGoogle Scholar
  44. [44] Jacobson Van, Smetters Diana K., Thornton James D., Plass Michael F., Briggs Nicholas H., and Braynard Rebecca L.. 2009. Networking named content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT’09). ACM, 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Karami Amin and Guerrero-Zapata Manel. 2015. A hybrid multiobjective RBF-PSO method for mitigating dos attacks in named data networking. Neurocomputing 151 (2015), 12621282.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Khelifi Hakima, Luo Senlin, Nour Boubakr, and Shah Sayed Chhattan. 2018. Security and privacy issues in vehicular named data networks: An overview. Mobile Information Systems 2018 (2018).Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Koponen Teemu, Chawla Mohit, Chun Byung-Gon, Ermolinskiy Andrey, Kim Kye Hyun, Shenker Scott, and Stoica Ion. 2007. A data-oriented (and beyond) network architecture. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’07). 181192.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Kumar Naveen, Singh Ashutosh Kumar, Aleem Abdul, and Srivastava Shashank. 2019. Security attacks in named data networking: A review and research directions. Journal of Computer Science and Technology 34, 6 (2019), 13191350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Kumar Naveen, Singh Ashutosh Kumar, and Srivastava Shashank. 2019. Feature selection for interest flooding attack in named data networking. International Journal of Computers and Applications 43, 6 (2019), 537546.Google ScholarGoogle Scholar
  50. [50] Lee Craig A., Zhang Zhiyi, Tu Yukai, Afanasyev Alex, and Zhang Lixia. 2018. Supporting virtual organizations using attribute-based encryption in named data networking. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC’18). IEEE, 188196.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Lehman Vince, Hoque A. K. M. Mahmudul, Yu Yingdi, Wang Lan, Zhang Beichuan, and Zhang Lixia. 2016. A secure link state routing protocol for NDN. Tech. Rep. NDN-0037 (2016).Google ScholarGoogle Scholar
  52. [52] Li Yanbiao, Zhang Zhiyi, Wang Xin, Lu Edward, Zhang Dafang, and Zhang Lixia. 2019. A secure sign-on protocol for smart homes over named data networking. IEEE Communications Magazine 57, 7 (2019), 6268.Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Li Zhaogeng and Bi Jun. 2014. Interest cash: An application-based countermeasure against interest flooding for dynamic content in named data networking. In Proceedings of the 9th International Conference on Future Internet Technologies (CFI’14). 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Li Zhuo, Xu Yaping, Zhang Beichuan, Yan Liu, and Liu Kaihua. 2018. Packet forwarding in named data networking requirements and survey of solutions. IEEE Communications Surveys & Tutorials 21, 2 (2018), 19501987.Google ScholarGoogle ScholarCross RefCross Ref
  55. [55] Liu Gang, Quan Wei, Cheng Nan, Feng Bohao, Zhang Hongke, and Shen Xuemin Sherman. 2018. BLAM: Lightweight Bloom-filter based DDoS mitigation for information-centric IoT. In 2018 IEEE Global Communications Conference (GLOBECOM’18). IEEE, 17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Liu Gang, Quan Wei, Cheng Nan, Wang Kai, and Zhang Hongke. 2018. Accuracy or delay? A game in detecting interest flooding attacks. Internet Technology Letters 1, 2 (2018), e31.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Lutz Roman. 2016. Security and privacy in future internet architectures—Benefits and challenges of content centric networks. arXiv preprint arXiv:1601.01278 (2016).Google ScholarGoogle Scholar
  58. [58] Mannes Elisa and Maziero Carlos. 2019. Naming content on the network layer: A security analysis of the information-centric network model. ACM Computing Surveys (CSUR) 52, 3 (2019), 128.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. [59] Mastorakis Spyridon, Mtibaa Abderrahmen, Lee Jonathan, and Misra Satyajayant. 2020. ICedge: When edge computing meets information-centric networking. IEEE Internet of Things Journal 7, 5 (2020), 42034217.Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Mtibaa Abderrahmen and Mastorakis Spyridon. 2020. NDNTP: A named data networking time protocol. arXiv preprint arXiv:2007.07807 (2020).Google ScholarGoogle Scholar
  61. [61] Nakatsuka Yoshimichi, Wijekoon Janaka L., and Nishi Hiroaki. 2018. FROG: A packet hop count based DDoS countermeasure in NDN. In 2018 IEEE Symposium on Computers and Communications (ISCC’18). IEEE, 0049200497.Google ScholarGoogle Scholar
  62. [62] Newberry Eric and Zhang Beichuan. 2019. On the power of in-network caching in the Hadoop distributed file system. In Proceedings of the 6th ACM Conference on Information-centric Networking (ICN’19). 8999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. [63] Nguyen Tan, Mai Hoang-Long, Cogranne Rémi, Doyen Guillaume, Mallouli Wissam, Nguyen Luong, Aoun Moustapha El, Oca Edgardo Montes De, and Festor Olivier. 2019. Reliable detection of interest flooding attack in real deployment of named data networking. IEEE Transactions on Information Forensics and Security 14, 9 (2019), 24702485.Google ScholarGoogle ScholarCross RefCross Ref
  64. [64] Nguyen Tan, Marchal Xavier, Doyen Guillaume, Cholez Thibault, and Cogranne Rémi. 2017. Content poisoning in named data networking: Comprehensive characterization of real deployment. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM’17). IEEE, 7280.Google ScholarGoogle Scholar
  65. [65] Nguyen Tan N., Cogranne Rémi, Doyen Guillaume, and Retraint Florent. 2015. Detection of interest flooding attacks in named data networking using hypothesis testing. In 2015 IEEE International Workshop on Information Forensics and Security (WIFS’15). IEEE, 16.Google ScholarGoogle Scholar
  66. [66] Pang Bin, Li Ru, Zhang Xin, Shi Jinshan, and Huang Manxin. 2017. Research on interest flooding attack analysis in conspiracy with content providers. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC’17). IEEE, 543547.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Psaras Ioannis, Ascigil Onur, Rene Sergi, Pavlou George, Afanasyev Alex, and Zhang Lixia. 2018. Mobile data repositories at the edge. In USENIX Workshop on Hot Topics in Edge Computing (HotEdge’18).Google ScholarGoogle Scholar
  68. [68] Pu Cong, Payne Nathaniel, and Brown Jacqueline. 2019. Self-adjusting share-based countermeasure to interest flooding attack in named data networking. In 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 142147.Google ScholarGoogle ScholarCross RefCross Ref
  69. [69] Rai Sandesh and Dhakal Dependra. 2018. A survey on detection and mitigation of interest flooding attack in named data networking. In Advanced Computational and Communication Paradigms. Springer, 523531.Google ScholarGoogle ScholarCross RefCross Ref
  70. [70] Rai Sandesh, Sharma Kalpana, and Dhakal Dependra. 2019. A survey on detection and mitigation of distributed denial-of-service attack in named data networking. In Advances in Communication, Cloud, and Big Data. Springer, 163171.Google ScholarGoogle Scholar
  71. [71] Ramani Sanjeev Kaushik, Tourani Reza, Torres George, Misra Satyajayant, and Afanasyev Alexander. 2019. NDN-ABS: Attribute-based signature scheme for named data networking. In Proceedings of the 6th ACM Conference on Information-centric Networking (ICN’19). 123133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Salah Hani and Strufe Thorsten. 2016. Evaluating and mitigating a collusive version of the interest flooding attack in NDN. In 2016 IEEE Symposium on Computers and Communication (ISCC’16). IEEE, 938945.Google ScholarGoogle Scholar
  73. [73] Salah Hani, Wulfheide Julian, and Strufe Thorsten. 2015. Coordination supports security: A new defence mechanism against interest flooding in NDN. In 2015 IEEE 40th Conference on Local Computer Networks (LCN’15). IEEE, 7381.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Schneider Klaus, Yi Cheng, Zhang Beichuan, and Zhang Lixia. 2016. A practical congestion control scheme for named data networking. In Proceedings of the 3rd ACM Conference on Information-centric Networking (ACM-ICN’16). 2130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. [75] Seskar Ivan, Nagaraja Kiran, Nelson Sam, and Raychaudhuri Dipankar. 2011. Mobilityfirst future internet architecture project. In Proceedings of the 7th Asian Internet Engineering Conference (AINTEC’11). 13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Shang Wentao, Wang Zhehao, Afanasyev Alexander, Burke Jeff, and Zhang Lixia. 2017. Breaking out of the cloud: Local trust management and rendezvous in named data networking of things. In Proceedings of the 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI’17). 313.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. [77] Shi Junxiao. 2017. Named Data Networking in Local Area Networks. Ph.D. Dissertation. The University of Arizona.Google ScholarGoogle Scholar
  78. [78] Shi Junxiao, Newberry Eric, and Zhang Beichuan. 2017. On broadcast-based self-learning in named data networking. In 2017 IFIP Networking Conference (IFIP Networking) and Workshops. IEEE, 19.Google ScholarGoogle ScholarCross RefCross Ref
  79. [79] Shigeyasu Tetsuya and Sonoda Ayaka. 2018. Distributed approach for detecting collusive interest flooding attack on named data networking. In International Conference on Network-Based Information Systems (NBiS’18). Springer, 7686.Google ScholarGoogle Scholar
  80. [80] Shinohara Ryoki, Kamimoto Takashi, Sato Kazuya, and Shigeno Hiroshi. 2016. Cache control method mitigating packet concentration of router caused by interest flooding attack. In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 324331.Google ScholarGoogle ScholarCross RefCross Ref
  81. [81] Signorello Salvatore, Marchal Samuel, François Jérôme, Festor Olivier, and State Radu. 2017. Advanced interest flooding attacks in named-data networking. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA’17). IEEE, 110.Google ScholarGoogle Scholar
  82. [82] So Won, Narayanan Ashok, and Oran David. 2013. Named data networking on a router: Fast and DoS-resistant forwarding with hash tables. In Architectures for Networking and Communications Systems. IEEE, 215225.Google ScholarGoogle ScholarCross RefCross Ref
  83. [83] Song Tian, Yuan Haowei, Crowley Patrick, and Zhang Beichuan. 2015. Scalable name-based packet forwarding: From millions to billions. In Proceedings of the 2nd ACM Conference on Information-centric Networking (ACM-ICN’15). 1928.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. [84] Tang Jianqiang, Zhang Zhongyue, Liu Ying, and Zhang Hongke. 2013. Identifying interest flooding in named data networking. In 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. IEEE, 306310.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. [85] Tourani Reza, Misra Satyajayant, Mick Travis, and Panwar Gaurav. 2017. Security, privacy, and access control in information-centric networking: A survey. IEEE Communications Surveys & Tutorials 20, 1 (2017), 566600.Google ScholarGoogle ScholarCross RefCross Ref
  86. [86] Tourani Reza, Torres George, and Misra Satyajayant. 2020. PERSIA: A PuzzlE-based InteReSt flooding attack countermeasure. In Proceedings of the 7th ACM Conference on Information-centric Networking (ICN’20). 117128.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. [87] Vassilakis Vassilios G., Alohali Bashar A., Moscholios I., and Logothetis Michael D.. 2015. Mitigating distributed denial-of-service attacks in named data networking. In Proceedings of the 11th Advanced International Conference on Telecommunications (AICT’15). 1823.Google ScholarGoogle Scholar
  88. [88] Virgilio Matteo, Marchetto Guido, and Sisto Riccardo. 2013. PIT overload analysis in content centric networks. In Proceedings of the 2016 New Security Paradigms Workshop (NSPW’16). 6772.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. [89] Voitalov Ivan, Aldecoa Rodrigo, Wang Lan, and Krioukov Dmitri. 2017. Geohyperbolic routing and addressing schemes. ACM SIGCOMM Computer Communication Review 47, 3 (2017), 1118.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. [90] Vusirikala Satyanarayana, Mastorakis Spyridon, Afanasyev Alexander, and Zhang Lixia. 2016. Hop-by-hop best effort link layer reliability in named data networking. NDN, Technical Report NDN-0041 (2016).Google ScholarGoogle Scholar
  91. [91] Wang Kai, Guo Dongchao, and Quan Wei. 2019. Analyzing NDN NACK on interest flooding attack via SIS epidemic model. IEEE Systems Journal 14, 2 (2019), 1862–1873.Google ScholarGoogle Scholar
  92. [92] Wang Kai, Zhao Yude, Tong Xiangrong, et al. 2017. On the urgency of implementing Interest NACK into CCN: From the perspective of countering advanced interest flooding attacks. IET Networks 7, 3 (2017), 136140.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Wang Kai, Zhou Huachun, Luo Hongbin, Guan Jianfeng, Qin Yajuan, and Zhang Hongke. 2014. Detecting and mitigating interest flooding attacks in content-centric network. Security and Communication Networks 7, 4 (2014), 685699.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. [94] Wang Kai, Zhou Huachun, Qin Yajuan, Chen Jia, and Zhang Hongke. 2013. Decoupling malicious interests from pending interest table to mitigate interest flooding attacks. In 2013 IEEE Globecom Workshops (GC Wkshps’13). IEEE, 963968.Google ScholarGoogle Scholar
  95. [95] Wang Kai, Zhou Huachun, Qin Yajuan, and Zhang Hongke. 2014. Cooperative-filter: Countering interest flooding attacks in named data networking. Soft Computing 18, 9 (2014), 18031813.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. [96] Wang Licheng, Pan Yun, Dong Mianxiong, Yu Yafang, and Wang Kun. 2017. Economic levers for mitigating interest flooding attack in named data networking. Mathematical Problems in Engineering 2017 (2017).Google ScholarGoogle Scholar
  97. [97] Wu Zhijun, Feng Wenzhi, Yue Meng, Xu Xinran, and Liu Liang. 2020. Mitigation measures of collusive interest flooding attacks in named data networking. Computers & Security 97 (2020), 101971.Google ScholarGoogle ScholarCross RefCross Ref
  98. [98] Xin Yonghui, Li Yang, Wang Wei, Li Weiyuan, and Chen Xin. 2016. A novel interest flooding attacks detection and countermeasure scheme in NDN. In 2016 IEEE Global Communications Conference (GLOBECOM’16). IEEE, 17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. [99] Xin Yonghui, Li Yang, Wang Wei, Li Weiyuan, and Chen Xin. 2017. Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In 2017 IEEE Military Communications Conference (MILCOM’17). IEEE, 557562.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. [100] Xylomenos George, Ververidis Christopher N., Siris Vasilios A., Fotiou Nikos, Tsilopoulos Christos, Vasilakos Xenofon, Katsaros Konstantinos V., and Polyzos George C.. 2013. A survey of information-centric networking research. IEEE Communications Surveys & Tutorials 16, 2 (2013), 10241049.Google ScholarGoogle ScholarCross RefCross Ref
  101. [101] Yi Cheng, Afanasyev Alexander, Moiseenko Ilya, Wang Lan, Zhang Beichuan, and Zhang Lixia. 2013. A case for stateful forwarding plane. Computer Communications 36, 7 (2013), 779791.Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. [102] Yin Gubei, Tang Junhua, Zou Futai, Wu Yue, and Li Jianhua. 2019. Controller based detection scheme of interest flooding attack in named data networking. In 2019 IEEE 5th International Conference on Computer and Communications (ICCC’19). IEEE, 16281633.Google ScholarGoogle ScholarCross RefCross Ref
  103. [103] Yu Yingdi, Afanasyev Alexander, Clark David, Claffy K. C., Jacobson Van, and Zhang Lixia. 2015. Schematizing trust in named data networking. In Proceedings of the 2nd ACM Conference on Information-centric Networking (ACM-ICN’15). 177186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. [104] Zhang Haitao, Li Yanbiao, Zhang Zhiyi, Afanasyev Alexander, and Zhang Lixia. 2018. NDN host model. ACM SIGCOMM Computer Communication Review 48, 3 (2018), 3541.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. [105] Zhang Haitao, Wang Zhehao, Scherb Christopher, Marxer Claudio, Burke Jeff, Zhang Lixia, and Tschudin Christian. 2016. Sharing mhealth data via named data networking. In Proceedings of the 3rd ACM Conference on Information-centric Networking (ACM-ICN’16). 142147.Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. [106] Zhang Lixia, Afanasyev Alexander, Burke Jeffrey, Jacobson Van, Crowley Patrick, Papadopoulos Christos, Wang Lan, Zhang Beichuan, et al. 2014. Named data networking. ACM SIGCOMM Computer Communication Review 44, 3 (2014), 6673.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. [107] Zhang Lixia, Estrin Deborah, Burke Jeffrey, Jacobson Van, Thornton James D., Smetters Diana K., Zhang Beichuan, Tsudik Gene, Massey Dan, Papadopoulos Christos, et al. 2010. Named data networking (NDN) project. Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC 157 (2010), 158.Google ScholarGoogle Scholar
  108. [108] Zhang Meng, Luo Hongbin, and Zhang Hongke. 2015. A survey of caching mechanisms in information-centric networking. IEEE Communications Surveys & Tutorials 17, 3 (2015), 14731499.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. [109] Zhang Xin and Li Ru. 2019. An ARI-HMM based interest flooding attack countermeasure in NDN. In 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD’19). IEEE, 1015.Google ScholarGoogle ScholarCross RefCross Ref
  110. [110] Zhang Zhiyi, Vasavada Vishrant, Osterweil Eric, Zhang Lixia, et al. 2019. Expect more from the networking: DDoS mitigation by FITT in named data networking. arXiv preprint arXiv:1902.09033 (2019).Google ScholarGoogle Scholar
  111. [111] Zhang Zhiyi, Yu Yingdi, Afanasyev Alex, and Zhang Lixia. 2017. NDN certificate management protocol (NDNCERT). NDN, Technical Report NDN-0050 (2017).Google ScholarGoogle Scholar
  112. [112] Zhang Zhiyi, Yu Yingdi, Ramani Sanjeev Kaushik, Afanasyev Alex, and Zhang Lixia. 2018. NAC: Automating access control via named data. In 2018 IEEE Military Communications Conference (MILCOM’18). IEEE, 626633.Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. [113] Zhang Zhiyi, Yu Yingdi, Zhang Haitao, Newberry Eric, Mastorakis Spyridon, Li Yanbiao, Afanasyev Alexander, and Zhang Lixia. 2018. An overview of security support in named data networking. IEEE Communications Magazine 56, 11 (2018), 6268.Google ScholarGoogle ScholarCross RefCross Ref
  114. [114] Zhi Ting, Liu Ying, Wang Jiushuang, and Zhang Hongke. 2019. Resist interest flooding attacks via entropy–SVM and Jensen–Shannon divergence in information-centric networking. IEEE Systems Journal 14, 2 (2019), 1776–1787.Google ScholarGoogle Scholar
  115. [115] Zhi Ting, Liu Ying, and Wu Jun. 2020. A reputation value-based early detection mechanism against the consumer-provider collusive attack in information-centric IoT. IEEE Access 8 (2020), 3826238275.Google ScholarGoogle ScholarCross RefCross Ref
  116. [116] Zhi Ting, Luo Hongbin, and Liu Ying. 2018. A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Communications Letters 22, 3 (2018), 538541.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 55, Issue 7
        July 2023
        813 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3567472
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 December 2022
        • Online AM: 1 June 2022
        • Accepted: 23 May 2022
        • Revised: 19 April 2022
        • Received: 12 February 2021
        Published in csur Volume 55, Issue 7

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • survey
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format