Paper Abstract and Keywords |
Presentation |
2019-07-04 09:00
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN. Our scheme is the countermeasure scheme for verification attack which is the concerned problem in the case where a router verifies contents. In verification attack, attackers request a large number of unverified contents that are not in a cache. After unverified contents are inserted into a cache of a router, attackers make a router verify them intensively by immediately requesting them. We focus on the fact that attackers request a large number of unverified contents at the first request. In the case where the access interval to the contents which are not in a cache becomes short dramatically, the router determines that verification attack has occurred and restrict requests of all users temporarily. However, in this case, it is impossible to identify attackers and restrict requests of legitimate users. Therefore, we focus on the fact that it is rare for legitimate users to request contents just inserted in a cache and it is necessary for attackers to request these contents for a short time. By giving low trust value to users requesting unverified contents that are in a cache, a router identify attackers and restrict only attackers’ request. Our evaluation results show our scheme can detect verification attack before the attack. Furthermore, we clearly demonstrate that our scheme can restrict only attackers’ requests. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
NDN / content poisoning attack / verification attack / trust value / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 119, no. 101, CS2019-13, pp. 1-6, July 2019. |
Paper # |
CS2019-13 |
Date of Issue |
2019-06-27 (CS) |
ISSN |
Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
CS2019-13 |
Conference Information |
Committee |
CS |
Conference Date |
2019-07-04 - 2019-07-05 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Amami City Social Welfare Center |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Next Generation Networks, Access Networks, Broadband Access, Power Line Communications, Wireless Communication Systems, Coding Systems, etc. |
Paper Information |
Registration To |
CS |
Conference Code |
2019-07-CS |
Language |
English (Japanese title is available) |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN |
Sub Title (in English) |
|
Keyword(1) |
NDN |
Keyword(2) |
content poisoning attack |
Keyword(3) |
verification attack |
Keyword(4) |
trust value |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Hironori Nakano |
1st Author's Affiliation |
Keio University (Keio Univ.) |
2nd Author's Name |
Hiroya Kato |
2nd Author's Affiliation |
Keio University (Keio Univ.) |
3rd Author's Name |
Shuichiro Haruta |
3rd Author's Affiliation |
Keio University (Keio Univ.) |
4th Author's Name |
Masashi Yoshida |
4th Author's Affiliation |
Keio University (Keio Univ.) |
5th Author's Name |
Iwao Sasase |
5th Author's Affiliation |
Keio University (Keio Univ.) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2019-07-04 09:00:00 |
Presentation Time |
15 minutes |
Registration for |
CS |
Paper # |
CS2019-13 |
Volume (vol) |
vol.119 |
Number (no) |
no.101 |
Page |
pp.1-6 |
#Pages |
6 |
Date of Issue |
2019-06-27 (CS) |
|