A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures
نویسندگان
چکیده
One key feature of named data networks (NDN) is supporting in-network caching to increase the content distribution for today’s Internet needs. However, previously cached contents may be threatened by side-channel timing measurements/attacks. For example, one adversary can identify distinguishing between uncached and from node, namely edge NDN router. The attacks mitigated proposed methods effectively. these countermeasures against paradigm, affecting performance. This work studied attack on streaming over applications a capable approach mitigate it. Firstly, recent attack, designated brute-force, was implemented ndnSIM using AT&T network topology. Then, multi-level countermeasure method, detection defense (DaD), this attack. Simulation results showed that DaD distinguishes legitimate nodes. During achieved minimum cache hit ratio (?0.7%) compared traditional (?4.1% in probabilistic ?3.7% freshness) without compromising requests.
منابع مشابه
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures
Content is at the heart of next-generation Internet architectures such as Content-Centric Networking (CCN): Instead of routing location-based messages to end hosts, the network transmits location-independent, named content objects. Such data objects can (and are envisioned to) be cached in arbitrary network nodes. In this technical report, we discuss several privacy attacks related to the ubiqu...
متن کاملAn ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
Named Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network caching is a key NDN feature. However, pervasive caching strengthens security problems namely cache pollution attacks including cache poisoning (i.e., introducing malicious con...
متن کاملA lightweight mechanism for detection of cache pollution attacks in Named Data Networking
24 25 26 27 28 29 30 31 32 33 Article history: Received 8 January 2013 Received in revised form 16 June 2013 Accepted 10 July 2013 Available online xxxx
متن کاملImplicit Cache Lockdown on ARM: An Accidental Countermeasure to Cache-Timing Attacks
As Moore’s law continues to reduce the cost of computation at an exponential rate, embedded computing capabilities spread to ever-expanding application scenarios, such as smartphones, the Internet of Things, and automation, among many others. This trend has naturally caused the underlying technology to evolve and has introduced increasingly complex microarchitectures into embedded processors in...
متن کاملCache-timing attacks on AES
This paper demonstrates complete AES key recovery from known-plaintext timings of a network server on another computer. This attack should be blamed on the AES design, not on the particular AES library used by the server; it is extremely difficult to write constant-time high-speed AES software for common general-purpose computers. This paper discusses several of the obstacles in detail.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11081265