Mitigate DDoS attacks in NDN by interest traceback

  title={Mitigate DDoS attacks in NDN by interest traceback},
  author={Huichen Dai and Y. Wang and Jindou Fan and B. Liu},
  journal={2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
  • Huichen Dai, Y. Wang, +1 author B. Liu
  • Published 2013
  • Computer Science
  • 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
  • Current Internet is reaching the limits of its capabilities due to its function transition from host-to-host communication to content dissemination. Named Data Networking (NDN) - an instantiation of Content-Centric Networking approach, embraces this shift by stressing the content itself, rather than where it locates. NDN tries to provide better security and privacy than current Internet does, and resilience to Distributed Denial of Service (DDoS) is a significant issue. In this paper, we… CONTINUE READING
    99 Citations
    Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking
    • 184
    • PDF
    Detecting and Mitigating DDoS Attack in Named Data Networking
    Advanced interest flooding attacks in named-data networking
    • 12
    • Highly Influenced
    • PDF
    Interest Flooding Attack in Named Data Networking: A Survey
    • 1
    Decoupling malicious Interests from Pending Interest Table to mitigate Interest Flooding Attacks
    • 39
    • Highly Influenced
    Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks
    • 7
    ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN
    • Highly Influenced
    • PDF
    Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN
    • Hani Salah, T. Strufe
    • Computer Science
    • 2016 IEEE Symposium on Computers and Communication (ISCC)
    • 2016
    • 25


    DoS & DDoS in Named Data Networking
    • 61
    • PDF
    On Pending Interest Table in Named Data Networking
    • 88
    • PDF
    Non-intrusive IP traceback for DDoS attacks
    • 14
    • PDF
    Network support for IP traceback
    • 727
    • PDF
    Practical network support for IP traceback
    • 1,070
    • PDF
    Hash-based IP traceback
    • 403
    • PDF
    Defending against denial of service attacks in Scout
    • 165
    • PDF