Abstract | ||
---|---|---|
In this work, we describe two attack scenarios exploiting a NDN vulnerability based on the fact that malicious nodes can send unexpected Data that can consume legitimate PIT entries, thus badly affecting NDN communications. We also propose two ways to prevent it. Both attacks and remediation strategies will be demonstrated at the conference. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1145/2984356.2985224 | ICN |
Field | DocType | Citations |
Computer security,Computer science,Computer network,Vulnerability,Distributed computing | Conference | 1 |
PageRank | References | Authors |
0.36 | 0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xavier Marchal | 1 | 10 | 3.19 |
Thibault Cholez | 2 | 100 | 11.89 |
Olivier Festor | 3 | 665 | 85.40 |