Filters








3,340 Hits in 5.0 sec

Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking

Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2zaau7xitzdupllip6mf432p5m" style="color: black;">38th Annual IEEE Conference on Local Computer Networks</a> </i> &nbsp;
We then introduce Poseidon: a framework for detecting and mitigating interest flooding attacks. Finally, we report on results of extensive simulations assessing proposed countermeasure.  ...  This paper focuses on distributed denial-of-service (DDoS) attacks; in particular we address interest flooding, an attack that exploits key architectural features of NDN.  ...  One such new architecture is Named Data Networking (NDN).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcn.2013.6761300">doi:10.1109/lcn.2013.6761300</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/lcn/CompagnoCGT13.html">dblp:conf/lcn/CompagnoCGT13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wjjd7v74f5ekvotwtabr2ln7iq">fatcat:wjjd7v74f5ekvotwtabr2ln7iq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809042230/http://sprout.ics.uci.edu/projects/ndn/papers/ndn_poseidon.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e1/34/e134373edcb44398ad84d338293e475a31d172d4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcn.2013.6761300"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Named Data Networking (NDN), Internet Architecture Design and Security Attacks

<span title="2019-10-11">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
In this paper, we surveyed different network issues and security attacks in Named Data Networks and its counter measures and also we identified a set of current challenges in NDN for budding researchers  ...  Due to content-centric networking platform, in which data has less importance, and proposed new terminology called Named Data Networking.  ...  There are two major attacks in physical and data link layer. i) Network sniffing -In named data network when the communication established, the application may capture the content and name without encryption  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.k1258.09811s19">doi:10.35940/ijitee.k1258.09811s19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3iz6k6oqqna23oucqyjltfin7y">fatcat:3iz6k6oqqna23oucqyjltfin7y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220227232127/https://www.ijitee.org/wp-content/uploads/papers/v8i11S/K125809811S19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/50/c3/50c36eb1291f575a313d8a9daef5471914a46f97.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.k1258.09811s19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security Challenges in Future NDN-Enabled VANETs

Salvatore Signorello, Maria Rita Palattella, Luigi Alfredo Grieco
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yaqmt4o5gzav5ivi6pnbkjqdui" style="color: black;">2016 IEEE Trustcom/BigDataSE/ISPA</a> </i> &nbsp;
Interest flooding attacks, cache poisoning attacks and privacy violation attacks by means of content names represent concrete NDN threats.  ...  As an evidence, several preliminary investigations have been performed on a widely known ICN instance, i.e., the Named-Data Networking (NDN).  ...  Interest Flooding Attacks An Interest flooding attack floods the network with a huge amount of fake content requests to saturate either the network's resources or the content provider ones.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom.2016.0272">doi:10.1109/trustcom.2016.0272</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/trustcom/SignorelloPG16.html">dblp:conf/trustcom/SignorelloPG16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/onff5wt5k5bklg6tt5pbh7mfl4">fatcat:onff5wt5k5bklg6tt5pbh7mfl4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171220091821/http://contactproject.uni.lu/images/papers/EFINS2016.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f5/e3/f5e321c96454bc2058ae95ce528742aed4468f5c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom.2016.0272"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Revisiting Countermeasures Against NDN Interest Flooding

Samir Al-Sheikh, Matthias Wählisch, Thomas C. Schmidt
<span title="">2015</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xxnrzx6zbfet3cpxgjjmxzcqn4" style="color: black;">Proceedings of the 2nd International Conference on Information-Centric Networking - ICN &#39;15</a> </i> &nbsp;
Interest flooding has been identified as a major threat for the NDN infrastructure. Since then several approaches have been proposed to identify and to mitigate this attack.  ...  In this paper, we (a) classify nine existing countermeasures and (b) compare them in a consistent evaluation setup.  ...  This work was partially supported by the German BMBF within the projects SAFEST and Peeroskop.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2810156.2812604">doi:10.1145/2810156.2812604</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/acmicn/Al-SheikhWS15.html">dblp:conf/acmicn/Al-SheikhWS15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xf7cajp4sjbazmlnsh22ibr2ma">fatcat:xf7cajp4sjbazmlnsh22ibr2ma</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809081042/http://conferences.sigcomm.org/acm-icn/2015/proceedings/p195-al-sheikh.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/4d/414defa42b86a9cac08e277aa7f4bcc1babb273b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2810156.2812604"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Interest Flooding Attack Countermeasures Assessment on Content Centric Networking

Matteo Virgilio, Guido Marchetto, Riccardo Sisto
<span title="">2015</span> <i title="IEEE"> 2015 12th International Conference on Information Technology - New Generations </i> &nbsp;
denial of service attacks, commonly known as Interest Flooding Attack (IFA).  ...  We run different simulation campaigns in a real deployment scenario to support our evaluation. Content Centric Networking, interest flooding attack, security, DoS, simulation I.  ...  This attack is also known in the literature as Interest Flooding Attack, meaning one or more end users flooding the network with Interests targeted at non existing resources, which only waste router memory  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/itng.2015.122">doi:10.1109/itng.2015.122</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nfltqsmjhfghtdrxpqshiigiee">fatcat:nfltqsmjhfghtdrxpqshiigiee</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725013526/https://iris.polito.it/retrieve/handle/11583/2588564/98324/2015_ITNG_CCN.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/75/04/7504d81980f41e596ac1aee4973d2400a0315082.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/itng.2015.122"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Advanced interest flooding attacks in named-data networking

Salvatore Signorello, Samuel Marchal, Jerome Francois, Olivier Festor, Radu State
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6at4l6ybkzfgpezv5x4vq24upu" style="color: black;">2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)</a> </i> &nbsp;
attack, the Interest Flooding Attack (IFA).  ...  The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking.  ...  ACKNOWLEDGMENT This work was undertaken under the Pollux II IDSECOM project supported by the National Research Fund Luxembourg (FNR) and the National Centre for Research and Development (NCBiR) in Poland  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/nca.2017.8171325">doi:10.1109/nca.2017.8171325</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/nca/SignorelloMFFS17.html">dblp:conf/nca/SignorelloMFFS17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h2ikjih3dzh3fhxcgsrdj5te64">fatcat:h2ikjih3dzh3fhxcgsrdj5te64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722021959/https://hal.inria.fr/hal-01636494/file/main.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fb/8e/fb8eac29f40c22e1d47c7639b8f4b23e7a7ff823.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/nca.2017.8171325"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

DoS and DDoS in Named Data Networking

Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3x67lwnpmjf6xcsnrggez3gqqe" style="color: black;">2013 22nd International Conference on Computer Communication and Networks (ICCCN)</a> </i> &nbsp;
In this paper, we focus on DoS in Named Data Networking (NDN) -a specific candidate for next-generation Internet architecture designs.  ...  By naming data instead of its locations, NDN transforms data into a first-class entity and makes itself an attractive and viable approach to meet the needs for many current and emerging applications.  ...  Based on the key components in an NDN router, we identified two new types of attacks that can impact an NDN network: interest flooding and cache/content poisoning, and discussed effects and potential countermeasures  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icccn.2013.6614127">doi:10.1109/icccn.2013.6614127</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icccn/GastiTU013.html">dblp:conf/icccn/GastiTU013</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e74tdowqkvghnaoph7hwaiq6l4">fatcat:e74tdowqkvghnaoph7hwaiq6l4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321173222/http://www.6nelweb.com/bio/papers/ddos-ICCCN13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/07/a507263677da46bbb6723214400b0ba38db47861.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icccn.2013.6614127"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

DoS and DDoS in Named-Data Networking [article]

Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang
<span title="2012-08-07">2012</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we focus on DoS in a specific candidate next-generation Internet architecture called Named-Data Networking (NDN) -- an instantiation of Information-Centric Networking approach.  ...  Although they vary in maturity and scope, in order to avoid past pitfalls, these efforts seek to treat security and privacy as fundamental requirements.  ...  Current literature addresses both attacks and countermeasures on the routing infrastructure [20] , packet flooding [23] , reflection attacks [30] , DNS cache poisoning [31] and SYN flooding attacks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1208.0952v2">arXiv:1208.0952v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ronnyrqdjfc57gmcnal3pt6lg4">fatcat:ronnyrqdjfc57gmcnal3pt6lg4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191017135252/https://arxiv.org/pdf/1208.0952v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b0/6c/b06cfce2d815b6c1f3fa9ea2b879e1dd3f9ac86b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1208.0952v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Detection of interest flooding attacks in Named Data Networking using hypothesis testing

Tan N. Nguyen, Remi Cogranne, Guillaume Doyen, Florent Retraint
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/p3rsr4na2ng65gbhxguxmgt6wm" style="color: black;">2015 IEEE International Workshop on Information Forensics and Security (WIFS)</a> </i> &nbsp;
"Interest flooding attack and countermeasures in Named Data Networking." IFIP Networking Conference, 2013 2 A. Compagno et al.  ...  "Poseidon: Mitigating interest flooding DDoS attacks in named data networking."  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wifs.2015.7368571">doi:10.1109/wifs.2015.7368571</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wifs/NguyenCDR15.html">dblp:conf/wifs/NguyenCDR15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/aettrc23yvfeff45b2edr7bpai">fatcat:aettrc23yvfeff45b2edr7bpai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160527015730/https://sigport.org/sites/default/files/WIFS2015_T_Nguyen.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6f/6e/6f6ed96a3bfd0dbbfdac7884860ed1958d893876.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wifs.2015.7368571"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks

G. Santhi, R. Sowmiya
<span title="2017-02-15">2017</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
To avoid the data loss and for secure transmission of data, several countermeasures have been introduced.  ...  The main focus of this paper is to provide a detailed survey on various attacks and the countermeasures employed to safeguard the network from malicious attacks.  ...  In order to avoid the attacks that tries to compromise a node and getting access to the entire network, various countermeasures and secure routing protocols [14] are given in SECURE ROUTING PROTOCOLS  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2017912972">doi:10.5120/ijca2017912972</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xaigoff2yjc5lp5f7zbahlaoee">fatcat:xaigoff2yjc5lp5f7zbahlaoee</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604135417/https://www.ijcaonline.org/archives/volume159/number7/santhi-2017-ijca-912972.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/03/c1/03c1eae55db37b068a122a468d29ddb428d74845.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2017912972"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks [article]

Roman Lutz
<span title="2016-01-13">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this work, we compare the Content Centric Networking approach with the current Internet with respect to security and privacy.  ...  Every communication is treated as a distribution of content and caches are used within the network to improve the effectiveness.  ...  Interest Flooding Attacks As explained in Section 4.3, DoS attacks in Content Centric Networks will target routers instead of content providers.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1601.01278v2">arXiv:1601.01278v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/odzaekopuvbmphulsk5vtmoqji">fatcat:odzaekopuvbmphulsk5vtmoqji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191019091130/https://arxiv.org/pdf/1601.01278v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8e/c1/8ec1c380c99e84e8f6c33de16ac3e9ddfe37a8da.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1601.01278v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking

Amin Karami, Manel Guerrero-Zapata
<span title="">2015</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bby322qx6ndsje4ypr56c7nnly" style="color: black;">Neurocomputing</a> </i> &nbsp;
However, NDN can be subject to new type of DoS attacks namely Interest flooding attacks and content poisoning. These types of attacks exploit key architectural features of NDN.  ...  Named Data Networking (NDN) is a promising network architecture being considered as a possible replacement for the current IP-based (host-centric) Internet infrastructure.  ...  Acknowledgment This work was partially supported by projects TIN2013-47272-C2-2 and SGR-2014-881.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.neucom.2014.11.003">doi:10.1016/j.neucom.2014.11.003</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wmrdvfvaynfkllducj4lqdqpwa">fatcat:wmrdvfvaynfkllducj4lqdqpwa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923031634/http://upcommons.upc.edu/bitstream/handle/2117/76836/DoS%20Mitigating%20in%20NDN.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c9/d3/c9d3733befa7013439ad6f09d2153daf98503c65.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.neucom.2014.11.003"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Interest flooding attack mitigation in a vehicular named data network

Muhammad Abdullah, Imran Raza, Tanveer Zia, Syed Asad Hussain
<span title="2021-02-21">2021</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sjsq25sy2vglld5qo2bn66hx3u" style="color: black;">IET Intelligent Transport Systems</a> </i> &nbsp;
In IFA, attackers request for non-existent content to exhaust network resources and cause Interest packet flooding across the network.  ...  Vehicular named data network (VNDN) is the next-generation network architecture for intelligent transportation system.  ...  Countermeasures of IFA in named-centric networks comprise two phases, namely, detection and recovery.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/itr2.12042">doi:10.1049/itr2.12042</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yjxlkb4fjnaovoordcmcljoboi">fatcat:yjxlkb4fjnaovoordcmcljoboi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210715004801/https://ietresearch.onlinelibrary.wiley.com/doi/pdfdirect/10.1049/itr2.12042" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c9/4b/c94bc3709aee6b93227f7be7d04f3471412ba747.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/itr2.12042"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Named Data Networking: A survey

Divya Saxena, Vaskar Raychoudhury, Neeraj Suri, Christian Becker, Jiannong Cao
<span title="">2016</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x3ibtg2oifh47c73tgo66gjrw4" style="color: black;">Computer Science Review</a> </i> &nbsp;
Routing OSPFN [31] Two layers [32] NLSR [33] In Table V, we have summarized the possible security attacks and their countermeasures on NDN on a layer-by-layer basis.  ...  (total number of PIT entries existing at an NDN router), memory consumption (total memory consumed during named content routing), network utilization (total data transferred over the network), Interest  ...  Another proposed countermeasure against the Interest flooding DDoS attack on NDN network is Poseidon [151] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cosrev.2016.01.001">doi:10.1016/j.cosrev.2016.01.001</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z256vu3lwrdnpkzsdnruxtlosi">fatcat:z256vu3lwrdnpkzsdnruxtlosi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161224230543/http://www1.deeds.informatik.tu-darmstadt.de/External/PublicationData/0/NDN-Survey-Final.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9e/df/9edf37e14ebca25cf04a9c348cedf0486c211ffc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cosrev.2016.01.001"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

DDoS Flooding Attack Mitigation in Software Defined Networks

Safaa MAHRACH, Abdelkrim HAQIQ
<span title="">2020</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
For example, the disruption of the SDN controller could interrupt data communication in the whole SDN network.  ...  In this research work, we propose a lightweight and practical mitigation mechanism to protect SDN architecture against DDoS flooding threats and ensure a secure and efficient SDN-based networking environment  ...  In this research work, we interest in implementing a lightweight and practical mechanism to protect the centralized SDN controller and the data plane from SYN flood attack, and achieve an efficient networking  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2020.0110185">doi:10.14569/ijacsa.2020.0110185</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/odzmhucspzeyhpwdt3wmv67tgi">fatcat:odzmhucspzeyhpwdt3wmv67tgi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200205190050/https://thesai.org/Downloads/Volume11No1/Paper_85-DDoS_Flooding_Attack_Mitigation_in_Software_Defined_Networks.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/84/2d/842d1e84536017fa622584a35cf002415576ceff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2020.0110185"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 3,340 results