A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures

نویسندگان

چکیده

One key feature of named data networks (NDN) is supporting in-network caching to increase the content distribution for today’s Internet needs. However, previously cached contents may be threatened by side-channel timing measurements/attacks. For example, one adversary can identify distinguishing between uncached and from node, namely edge NDN router. The attacks mitigated proposed methods effectively. these countermeasures against paradigm, affecting performance. This work studied attack on streaming over applications a capable approach mitigate it. Firstly, recent attack, designated brute-force, was implemented ndnSIM using AT&T network topology. Then, multi-level countermeasure method, detection defense (DaD), this attack. Simulation results showed that DaD distinguishes legitimate nodes. During achieved minimum cache hit ratio (?0.7%) compared traditional (?4.1% in probabilistic ?3.7% freshness) without compromising requests.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures

Content is at the heart of next-generation Internet architectures such as Content-Centric Networking (CCN): Instead of routing location-based messages to end hosts, the network transmits location-independent, named content objects. Such data objects can (and are envisioned to) be cached in arbitrary network nodes. In this technical report, we discuss several privacy attacks related to the ubiqu...

متن کامل

An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking

Named Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network caching is a key NDN feature. However, pervasive caching strengthens security problems namely cache pollution attacks including cache poisoning (i.e., introducing malicious con...

متن کامل

A lightweight mechanism for detection of cache pollution attacks in Named Data Networking

24 25 26 27 28 29 30 31 32 33 Article history: Received 8 January 2013 Received in revised form 16 June 2013 Accepted 10 July 2013 Available online xxxx

متن کامل

Implicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks

As Moore’s law continues to reduce the cost of computation at an exponential rate, embedded computing capabilities spread to ever-expanding application scenarios, such as smartphones, the Internet of Things, and automation, among many others. This trend has naturally caused the underlying technology to evolve and has introduced increasingly complex microarchitectures into embedded processors in...

متن کامل

Cache-timing attacks on AES

This paper demonstrates complete AES key recovery from known-plaintext timings of a network server on another computer. This attack should be blamed on the AES design, not on the particular AES library used by the server; it is extremely difficult to write constant-time high-speed AES software for common general-purpose computers. This paper discusses several of the obstacles in detail.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11081265