Results 1 to 10 of about 20,930 (183)

A Survey on Mitigation of Cache Pollution Attacks in NDN

open access: diamondActa Technica Jaurinensis
Named Data Networking (NDN) improves data retrieval by using in-network caching, but this advantage makes it susceptible to cache pollution attacks, where malicious or irrelevant content fills caches and reduces network efficiency.
Najam U Saqib, Sani Isnain
doaj   +4 more sources

RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking

open access: greenIET Networks, 2020
Named data networking (NDN) corresponds to content‐centric networking, content‐based networking, and data‐oriented networking. Future internet architecture is modelled to overcome the fundamental limitations of the present internet protocol‐based ...
Ramachandira Moorthy Buvanesvari   +1 more
doaj   +2 more sources

Request pattern change-based cache pollution attack detection and defense in edge computing

open access: diamondDigital Communications and Networks, 2023
Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network.
Junwei Wang   +5 more
doaj   +2 more sources

Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking

open access: goldIEEE Access, 2017
Content-centric networking (CCN) aims to improve network reliability, scalability, and security by changing the way that information is organized and retrieved in the current Internet. One critical issue in CCN is in-network cache allocation. It is known
Guozhi Zhang   +3 more
doaj   +2 more sources

Cache-Poll: Containing Pollution in Non-Inclusive Caches Through Cache Partitioning

open access: greenProceedings of the 51st International Conference on Parallel Processing, 2022
[EN] Current server processors have redistributed the cache hierarchy space over previous generations. The private L2 cache has been made larger and the shared last level caches (LLC) smaller but designed as non-inclusive to reduce the number of replicated blocks. As a result, the new organization shrinks the per-core cache area.
Pons-Escat, Lucía   +3 more
openaire   +4 more sources

Integrated Cache Scheduling Replacement Algorithm to Reduce Cache Pollution

open access: diamondInternational Journal of Recent Technology and Engineering (IJRTE), 2019
Cache memory management has recently become one of the most crucial research topics in the area of high performance computing. The cache memory has gained popularity due to its capability to offer faster access compared to main memory so processor can access data directly through cache very efficiently.
Kavita Kalambe   +3 more
openaire   +2 more sources

An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking [PDF]

open access: bronzeComputer Networks, 2015
Named Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network caching is a key NDN feature. However, pervasive caching strengthens security problems namely cache pollution attacks including cache
Karami, Amin, Guerrero Zapata, Manel
openaire   +5 more sources

ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN [PDF]

open access: gold2015 IEEE 40th Conference on Local Computer Networks (LCN), 2015
As a promising architectural design for future Internet, named data networking (NDN) relies on in-network caching to efficiently deliver name-based content. However, the in-network caching is vulnerable to cache pollution attacks (CPA), which can reduce cache hits by violating cache locality and significantly degrade the overall performance of NDN.
Xu, Zhiwei   +4 more
openaire   +4 more sources

Effective Cache Management and Pollution Reduction for Online Privacy

open access: diamondProcedia Computer Science, 2016
AbstractImproving cache usability is important for high performance computing results. Various cache management policies like (LRU), (MRU), etc. are used to manage the buffering of cache for reducing the dirty cache problem. They do not consider any future requirement of user nor prediction of usage of cache.
Joshi, Mayuri, Shrawankar, Urmila
openaire   +2 more sources

Cache Pollution Detection Method Based on GBDT in Information-Centric Network [PDF]

open access: hybridSecurity and Communication Networks, 2021
There is a new cache pollution attack in the information-centric network (ICN), which fills the router cache by sending a large number of requests for nonpopular content. This attack will severely reduce the router cache hit rate. Therefore, the detection of cache pollution attacks is also an urgent problem in the current information center network. In
Dapeng Man   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy