Exploiting information centric networking to build an attacker-controlled content delivery network

@article{Mauri2015ExploitingIC,
  title={Exploiting information centric networking to build an attacker-controlled content delivery network},
  author={Giulia Mauri and Riccardo Raspadori and Mario Gerla and Giacomo Verticale},
  journal={2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)},
  year={2015},
  pages={1-6}
}
The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor's home router, with significant performance improvement. This paper shows how an attacker using compromised hosts can easily gather a massive amount of low-cost, low-latency storage for malware, junk, and… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-2 of 2 extracted citations

Exploiting Path Diversity for Thwarting Pollution Attacks in Named Data Networking

IEEE Transactions on Information Forensics and Security • 2016
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Cache Privacy in Named-Data Networking

2013 IEEE 33rd International Conference on Distributed Computing Systems • 2013
View 1 Excerpt

DoS and DDoS in Named Data Networking

2013 22nd International Conference on Computer Communication and Networks (ICCCN) • 2013
View 1 Excerpt

Networking named content

Commun. ACM • 2012
View 1 Excerpt

ndnSIM: NDN simulator for NS-3

A. Afanasyev, I. Moiseenko, L. Zhang
NDN, Technical Report NDN-0005, October 2012. [Online]. Available: http://named-data.net/techreports.html • 2012
View 1 Excerpt

Similar Papers

Loading similar papers…