Results 11 to 20 of about 20,930 (183)

Internet Cache Pollution Attacks and Countermeasures [PDF]

open access: closedProceedings of the 2006 IEEE International Conference on Network Protocols, 2006
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network?s resilience to denial-of-service (DoS) attacks, lack of cooperation can transform such servers into viable DoS targets.
Yan Gao   +3 more
  +4 more sources

Mitigating Prefetcher-Caused Pollution Using Informed Caching Policies for Prefetched Blocks [PDF]

open access: hybridACM Transactions on Architecture and Code Optimization, 2015
Many modern high-performance processors prefetch blocks into the on-chip cache. Prefetched blocks can potentially pollute the cache by evicting more useful blocks. In this work, we observe that both accurate and inaccurate prefetches lead to cache pollution, and propose a comprehensive mechanism to mitigate prefetcher-caused cache pollution ...
Vivek Seshadri   +6 more
openaire   +3 more sources

Clean-prefetcher: look-ahead prefetching without cache pollution

open access: diamondIEICE Electronics Express, 2021
Minshin Cho   +2 more
openaire   +3 more sources

Cache Pollution Attacks in the NDN Architecture: Impact and Analysis

open access: closed2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2021
Named Data Networking (NDN), one of the most suitable candidates for the future Internet architecture, allows all network nodes to have a local cache that is used to serve incoming content requests. Content caching is an essential component in NDN: content is cached in routers and used for future requests in order to reduce bandwidth consumption and ...
Hidouri, Abdelhak   +4 more
openaire   +4 more sources

Advancing NDN security: Efficient identification of cache pollution attacks through rank comparison

open access: greenInternet of Things, 2023
Pushpendu Kar   +4 more
  +4 more sources

Minimizing Single-Usage Cache Pollution for Effective Cache Hierarchy Management

open access: green, 2006
Efficient cache hierarchy management is of a paramount importance when designing high performance processors. Upon a miss, the conventional operation mode of a cache hierarchy is to retrieve back the missing block from higher levels and to store the block into all hierarchy levels.
Piquet, Thomas   +2 more
openaire   +3 more sources

Individual Family Contribution to Paper Pollution in Cache County

open access: green, 1972
Paper waste discarded by families of five persons in Cache County was studied for two seven-day periods. The sample consisted of 19 families comprised of a father who was employed full-time, a mother, and three children living at home. A background questionnaire was administered to each family for the purpose of describing the sample.
Carroll Porter Latham
openaire   +5 more sources

A Software Technique for Reducing Cache Pollution

open access: green, 2010
Contention for shared cache resources has been recognizedas a major bottleneck for multicores—especially for mixedworkloads of independent applications. While most modernprocessors implement instructions to manage caches, theseinstructions are largely unused due to a lack of understand-ing of how to best leverage them.
Sandberg, Andreas   +2 more
openaire   +2 more sources

Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution Attack

open access: green2024 International Wireless Communications and Mobile Computing (IWCMC)
Cache Pollution Attacks (CPA) are a growing concern in Named Data Networking (NDN) due to their potential to disrupt network services and compromise data integrity. While several defence mechanisms have been developed, they often struggle to keep up with the evolving nature of such attacks. This paper introduces a cutting-edge approach for detectingand
Hidouri, Abdelhak   +5 more
openaire   +4 more sources

Mitigating Cache Pollution Attack in Information Centric Mobile Internet [PDF]

open access: diamondKSII Transactions on Internet and Information Systems, 2019
Jia Chen, Yue Liang, Jing Chen
openaire   +2 more sources

Home - About - Disclaimer - Privacy