Results 1 to 10 of about 163 (94)

Request pattern change-based cache pollution attack detection and defense in edge computing

open access: yesDigital Communications and Networks, 2023
Through caching popular contents at the network edge, wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network.
Junwei Wang   +5 more
doaj   +2 more sources

A Survey on Mitigation of Cache Pollution Attacks in NDN

open access: yesActa Technica Jaurinensis
Named Data Networking (NDN) improves data retrieval by using in-network caching, but this advantage makes it susceptible to cache pollution attacks, where malicious or irrelevant content fills caches and reduces network efficiency.
Najam U Saqib, Sani Isnain
doaj   +2 more sources

Detection algorithm for cache pollution attacks based on node state model in content centric networking

open access: yesTongxin xuebao, 2016
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG   +3 more
doaj   +3 more sources

Internet Cache Pollution Attacks and Countermeasures [PDF]

open access: yesProceedings of the 2006 IEEE International Conference on Network Protocols, 2006
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network?s resilience to denial-of-service (DoS) attacks, lack of cooperation can transform such servers into viable DoS targets.
Yan Gao   +3 more
openaire   +2 more sources

A Register Access Control Scheme for SNR System to Counter CPA Attack Based on Malicious User Blacklist

open access: yesFuture Internet, 2021
Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators.
Jia Shi, Xuewen Zeng, Yang Li
doaj   +1 more source

Cache Pollution Attacks in the NDN Architecture: Impact and Analysis

open access: yes2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2021
Named Data Networking (NDN), one of the most suitable candidates for the future Internet architecture, allows all network nodes to have a local cache that is used to serve incoming content requests. Content caching is an essential component in NDN: content is cached in routers and used for future requests in order to reduce bandwidth consumption and ...
Hidouri, Abdelhak   +4 more
openaire   +3 more sources

ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN [PDF]

open access: yes2015 IEEE 40th Conference on Local Computer Networks (LCN), 2015
As a promising architectural design for future Internet, named data networking (NDN) relies on in-network caching to efficiently deliver name-based content. However, the in-network caching is vulnerable to cache pollution attacks (CPA), which can reduce cache hits by violating cache locality and significantly degrade the overall performance of NDN.
Xu, Zhiwei   +4 more
openaire   +2 more sources

An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking [PDF]

open access: yesComputer Networks, 2015
Named Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network caching is a key NDN feature. However, pervasive caching strengthens security problems namely cache pollution attacks including cache
Karami, Amin, Guerrero Zapata, Manel
openaire   +3 more sources

IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity [PDF]

open access: yesArabian Journal for Science and Engineering, 2021
Abstract The performance of Named Data Networking (NDN) depends on the caching efficiency of routers. Cache Pollution Attack (CPA) refers to colonization of unpopular contents in the Content Store (CS) of an NDN router, which leads to declined Quality of Service (QoS) in NDN. CPA has very few solutions proposed for its mitigation. Most of these
Naveen Kumar, Shashank Srivast
openaire   +1 more source

Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking

open access: yesComputer Networks, 2023
The Cache Pollution Attack (CPA) is a recent threat that poses a significant risk to Named Data Networks (NDN). This attack can impact the caching process in various ways, such as causing increased cache misses for legitimate users, delays in data retrieval, and exhaustion of resources in NDN routers.
Hidouri, Abdelhak   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy