A Triggered Delay-based Approach against Cache Privacy Attack in NDN

Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if th...

Full description

Bibliographic Details
Main Authors: Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava
Format: Article
Language:English
Published: Atlantis Press 2018-07-01
Series:International Journal of Networked and Distributed Computing (IJNDC)
Subjects:
CPA
NDN
Online Access:https://www.atlantis-press.com/article/25905548/view
id doaj-c3ae81fdfc0a47d3b59c99c4622c362d
record_format Article
spelling doaj-c3ae81fdfc0a47d3b59c99c4622c362d2020-11-24T21:15:22ZengAtlantis PressInternational Journal of Networked and Distributed Computing (IJNDC)2211-79462018-07-016310.2991/ijndc.2018.6.3.5A Triggered Delay-based Approach against Cache Privacy Attack in NDNNaveen KumarAshutosh Kumar SinghShashank SrivastavaContent caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.https://www.atlantis-press.com/article/25905548/viewCache Privacy AttackCPANamed Data NetworkingNDN
collection DOAJ
language English
format Article
sources DOAJ
author Naveen Kumar
Ashutosh Kumar Singh
Shashank Srivastava
spellingShingle Naveen Kumar
Ashutosh Kumar Singh
Shashank Srivastava
A Triggered Delay-based Approach against Cache Privacy Attack in NDN
International Journal of Networked and Distributed Computing (IJNDC)
Cache Privacy Attack
CPA
Named Data Networking
NDN
author_facet Naveen Kumar
Ashutosh Kumar Singh
Shashank Srivastava
author_sort Naveen Kumar
title A Triggered Delay-based Approach against Cache Privacy Attack in NDN
title_short A Triggered Delay-based Approach against Cache Privacy Attack in NDN
title_full A Triggered Delay-based Approach against Cache Privacy Attack in NDN
title_fullStr A Triggered Delay-based Approach against Cache Privacy Attack in NDN
title_full_unstemmed A Triggered Delay-based Approach against Cache Privacy Attack in NDN
title_sort triggered delay-based approach against cache privacy attack in ndn
publisher Atlantis Press
series International Journal of Networked and Distributed Computing (IJNDC)
issn 2211-7946
publishDate 2018-07-01
description Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.
topic Cache Privacy Attack
CPA
Named Data Networking
NDN
url https://www.atlantis-press.com/article/25905548/view
work_keys_str_mv AT naveenkumar atriggereddelaybasedapproachagainstcacheprivacyattackinndn
AT ashutoshkumarsingh atriggereddelaybasedapproachagainstcacheprivacyattackinndn
AT shashanksrivastava atriggereddelaybasedapproachagainstcacheprivacyattackinndn
AT naveenkumar triggereddelaybasedapproachagainstcacheprivacyattackinndn
AT ashutoshkumarsingh triggereddelaybasedapproachagainstcacheprivacyattackinndn
AT shashanksrivastava triggereddelaybasedapproachagainstcacheprivacyattackinndn
_version_ 1716745528495046656