A Triggered Delay-based Approach against Cache Privacy Attack in NDN
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if th...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Atlantis Press
2018-07-01
|
Series: | International Journal of Networked and Distributed Computing (IJNDC) |
Subjects: | |
Online Access: | https://www.atlantis-press.com/article/25905548/view |
id |
doaj-c3ae81fdfc0a47d3b59c99c4622c362d |
---|---|
record_format |
Article |
spelling |
doaj-c3ae81fdfc0a47d3b59c99c4622c362d2020-11-24T21:15:22ZengAtlantis PressInternational Journal of Networked and Distributed Computing (IJNDC)2211-79462018-07-016310.2991/ijndc.2018.6.3.5A Triggered Delay-based Approach against Cache Privacy Attack in NDNNaveen KumarAshutosh Kumar SinghShashank SrivastavaContent caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay.https://www.atlantis-press.com/article/25905548/viewCache Privacy AttackCPANamed Data NetworkingNDN |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Naveen Kumar Ashutosh Kumar Singh Shashank Srivastava |
spellingShingle |
Naveen Kumar Ashutosh Kumar Singh Shashank Srivastava A Triggered Delay-based Approach against Cache Privacy Attack in NDN International Journal of Networked and Distributed Computing (IJNDC) Cache Privacy Attack CPA Named Data Networking NDN |
author_facet |
Naveen Kumar Ashutosh Kumar Singh Shashank Srivastava |
author_sort |
Naveen Kumar |
title |
A Triggered Delay-based Approach against Cache Privacy Attack in NDN |
title_short |
A Triggered Delay-based Approach against Cache Privacy Attack in NDN |
title_full |
A Triggered Delay-based Approach against Cache Privacy Attack in NDN |
title_fullStr |
A Triggered Delay-based Approach against Cache Privacy Attack in NDN |
title_full_unstemmed |
A Triggered Delay-based Approach against Cache Privacy Attack in NDN |
title_sort |
triggered delay-based approach against cache privacy attack in ndn |
publisher |
Atlantis Press |
series |
International Journal of Networked and Distributed Computing (IJNDC) |
issn |
2211-7946 |
publishDate |
2018-07-01 |
description |
Content caching is one of the most significant features of Named Data Networking (NDN) that improves the performance. However, this feature makes the cache vulnerable to attacks that determine the recent cache access pattern. In cache privacy attack, an attacker can probe request and determine if the received content is cached or not, by simply observing the time difference between the requested and the received data. Existing solutions apply delay whenever the data is accessed from the cache. These approaches mitigate attack to some extent but compromise the performance of NDN. To overcome this issue, a counter scheme has been proposed in this article that detects the attack pattern at the gateway router itself and triggers the countermeasure in case of attack. The triggered-based approach delays the data accessed from the cache, only when the attack is detected instead of each time when the data is accessed from the cache. The proposed approach has been compared with an approach that induces a random delay in case of the cache hit. The results prove that the triggered delay-based approach is better than the random delay approach in terms of average delay. |
topic |
Cache Privacy Attack CPA Named Data Networking NDN |
url |
https://www.atlantis-press.com/article/25905548/view |
work_keys_str_mv |
AT naveenkumar atriggereddelaybasedapproachagainstcacheprivacyattackinndn AT ashutoshkumarsingh atriggereddelaybasedapproachagainstcacheprivacyattackinndn AT shashanksrivastava atriggereddelaybasedapproachagainstcacheprivacyattackinndn AT naveenkumar triggereddelaybasedapproachagainstcacheprivacyattackinndn AT ashutoshkumarsingh triggereddelaybasedapproachagainstcacheprivacyattackinndn AT shashanksrivastava triggereddelaybasedapproachagainstcacheprivacyattackinndn |
_version_ |
1716745528495046656 |