Results 91 to 100 of about 202 (132)
Some of the next articles are maybe not open access.

Detection of cache pollution attacks using randomness checks

2012 IEEE International Conference on Communications (ICC), 2012
The Internet plays an increasing role in content dissemination as user-generated contents have exploded recently. Cache servers have been deployed to bypass bottlenecks in the network so that contents can be delivered to end users more efficiently. With caches becoming more embedded in the networks, emerging threats follow naturally.
Hyundo Park, Indra Widjaja, Heejo Lee
openaire   +1 more source

Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in ICN

2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2021
Information Centric Network (ICN) is upcoming next-generation internet. The ubiquitous caching is primary goal of ICN to reduce the content latency and increase the user satisfaction ratio in the network. Due to this pervasive caching, its prone to security attack namely Cache pollution Attack (CPA) and cache poisoning attack.
Vimala Rani   +5 more
openaire   +1 more source

A Novel Cache Replacement Scheme against Cache Pollution Attack in Content-Centric Networks

2019 IEEE/CIC International Conference on Communications in China (ICCC), 2019
In-network cache is a key service of content-centric networks. As an instance of content-centric networks, Named Data Networking (NDN) uses the traditional Least Recently Used (LRU) and Least Frequently Used (LFU) cache replacement strategy, which will cause large storage redundancy.
Ying Liu   +4 more
openaire   +1 more source

Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks

IEEE Transactions on Emerging Topics in Computational Intelligence, 2020
With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other.
Qichao Xu, Zhou Su, Kuan Zhang, Peng Li
openaire   +1 more source

Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network

IEEE Transactions on Dependable and Secure Computing, 2022
Vehicular Content Centric Network (VCCN) has been proposed to address the issues of user mobility and sporadic connectivity in VANET. The in-network caching of VCCN can indeed improve the performance of content distribution. However, data caching unfortunately suffers from Cache Pollution Attack (CPA) that sends out fabricated requests to pollute the ...
Lin Yao   +3 more
openaire   +1 more source

Detection of Cache Pollution Attacks in a Secure Information-Centric Network

2021
The future of Internet architectures is information-centric networking structure, to solve the problems of content spoofing attacks in the current Internet structure, making it more useful for IoT-based applications. The ICN is structured with the Internet forwarding state technology which is an advanced technology with a comparative structure. In this
Akanksha Gupta, Priyank Nahar
openaire   +1 more source

Investigating the impact of cache pollution attacks in heterogeneous cellular networks

2017 IEEE 25th International Conference on Network Protocols (ICNP), 2017
With the growth of Internet-of-Things, mobile data traffic is expected to increase exponentially. To support this rapid growth, heterogeneous cellular networks comprising of femtocells with storage capabilities along with macrocell base stations have been proposed.
Sibendu Paul   +3 more
openaire   +1 more source

Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks

IEEE Transactions on Dependable and Secure Computing, 2020
Named Data Network (NDN), as a promising information-centric networking architecture, is expected to support next-generation of large-scale content distribution with open in-network cachings. However, such open in-network caches are vulnerable against Cache Pollution Attacks (CPAs) with the goal of filling cache storage with non-popular contents.
Lin Yao   +4 more
openaire   +1 more source

Exploring the behaviors and threats of pollution attack in cooperative MEC caching

2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018
The cooperative Mobile Edge Computing (MEC) caching, where caches are distributed in 5G edge to cooperatively bring popular contents closer to mobile users, is concocted with high expectation on improving users' quality of experience. However, the system may suffer severely from the pollution attack.
Chang Yang   +3 more
openaire   +1 more source

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

Computer Networks, 2013
Content-Centric Networking (CCN) is an emerging paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content - rather than addressable hosts - becomes a first-class entity. Content is therefore decoupled from its location.
CONTI, MAURO, Paolo Gasti, Marco Teoli
openaire   +1 more source

Home - About - Disclaimer - Privacy