Title
Exploiting information centric networking to build an attacker-controlled content delivery network
Abstract
The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor’s home router, with significant performance improvement. This paper shows how an attacker using compromised hosts can easily gather a massive amount of low-cost, low-latency storage for malware, junk, and other attacker-controlled content. We conclude by considering a possible countermeasure, a blacklist fed by a honeypot, which we show to be effective.
Year
DOI
Venue
2015
10.1109/MedHocNet.2015.7173159
2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)
Keywords
Field
DocType
Information Centric Networking,Named Data Networking,ndnSIM,Cache Pollution,False Locality,Honeypot
Content delivery network,Honeypot,Computer security,Computer science,Blacklist,Computer network,Bandwidth (signal processing),Information-centric networking,Router,Malware,Performance improvement
Conference
Citations 
PageRank 
References 
2
0.36
12
Authors
4
Name
Order
Citations
PageRank
Giulia Mauri1333.32
Riccardo Raspadori220.36
Mario Gerla3164652117.01
Giacomo Verticale421326.03