Results 1 to 10 of about 20,864 (141)

A Survey on Mitigation of Cache Pollution Attacks in NDN

open access: yesActa Technica Jaurinensis
Named Data Networking (NDN) improves data retrieval by using in-network caching, but this advantage makes it susceptible to cache pollution attacks, where malicious or irrelevant content fills caches and reduces network efficiency.
Najam U Saqib, Sani Isnain
doaj   +2 more sources

Optimization Method of Streaming Storage Based on GCC Compiler [PDF]

open access: yesJisuanji kexue, 2022
To solve the problem of cache pollution and mandatory loss caused by streaming memory access,some high-perfor-mance general-purpose processor platforms provide a dedicated path and supporting instructions for accessing memory directly without accessing ...
GAO Xiu-wu, HUANG Liang-ming, JIANG Jun
doaj   +1 more source

Internet Cache Pollution Attacks and Countermeasures [PDF]

open access: yesProceedings of the 2006 IEEE International Conference on Network Protocols, 2006
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network?s resilience to denial-of-service (DoS) attacks, lack of cooperation can transform such servers into viable DoS targets.
Yan Gao   +3 more
openaire   +2 more sources

Request pattern change-based cache pollution attack detection and defense in edge computing

open access: yesDigital Communications and Networks, 2023
Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network.
Junwei Wang   +5 more
doaj   +1 more source

Enhancing Cache Robustness in Information-Centric Networks: Per-Face Popularity Approaches

open access: yesNetwork, 2023
Information-Centric Networking (ICN) is a new paradigm of network architecture that focuses on content rather than hosts as first-class citizens of the network. As part of these architectures, in-network storage devices are essential to provide end users
John Baugh, Jinhua Guo
doaj   +1 more source

A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking

open access: yesComputers, 2022
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency of such architecture ...
Abdelhak Hidouri   +4 more
doaj   +1 more source

RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking

open access: yesIET Networks, 2020
Named data networking (NDN) corresponds to content‐centric networking, content‐based networking, and data‐oriented networking. Future internet architecture is modelled to overcome the fundamental limitations of the present internet protocol‐based ...
Ramachandira Moorthy Buvanesvari   +1 more
doaj   +1 more source

A Register Access Control Scheme for SNR System to Counter CPA Attack Based on Malicious User Blacklist

open access: yesFuture Internet, 2021
Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators.
Jia Shi, Xuewen Zeng, Yang Li
doaj   +1 more source

Ideal and Predictable Hit Ratio for Matrix Transposition in Data Caches

open access: yesMathematics, 2020
Matrix transposition is a fundamental operation, but it may present a very low and hardly predictable data cache hit ratio for large matrices. Safe (worst-case) hit ratio predictability is required in real-time systems.
Alba Pedro-Zapater   +4 more
doaj   +1 more source

A Community-based Cloud Computing Caching Service [PDF]

open access: yes, 2015
Caching has become an important technology in the development of cloud computing-based high-performance web services. Caches reduce the request to response latency experienced by users, and reduce workload on backend databases. They need a high cache-hit
Idachaba, Unekwu, Wang, Frank Z.
core   +1 more source

Home - About - Disclaimer - Privacy