Interest Flooding Attack

From HandWiki

An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking (NDN)). An attacker requests existing or non-existing content in order to overload the distribution infrastructure.[1] This can be implemented by sending Interest packets, which are not resolved at all or not resolved fast enough, and thus lead to malicious CPU or memory consumption.[2] This attack was previously denoted an open problem in ICN, only heuristic countermeasures available.[vague][3] In 2016, Aubrey Alston and Tamer Refaei of The MITRE Corporation presented an exact solution to this problem which utilizes an in-packet cryptographic mechanism to remove the ability of high-volume Interest traffic to overload the distribution infrastructure of the network.[4]

References

  1. Wählisch, Matthias; Schmidt, Thomas C.; Vahlenkamp, Markus (2013). "Backscatter from the Data Plane -- Threats to Stability and Security in Information-Centric Network Infrastructure". Computer Networks (Original version arXiv:1205.4778v1, May 2012) 57 (16): 3192–3206. doi:10.1016/j.comnet.2013.07.009. http://page.mi.fu-berlin.de/waehl/papers/interest-flooding-wsv-bdpts-13.pdf. 
  2. "Volatile Memory - an overview | ScienceDirect Topics". https://www.sciencedirect.com/topics/computer-science/volatile-memory. 
  3. Afanasyev, Alexander; Mahadevan, Priya; Moiseenko, Ilya; Uzun, Ersin; Zhang, Lixia (2013). "Interest Flooding Attack and Countermeasures in Named Data Networking". http://lasr.cs.ucla.edu/afanasyev/data/files/Afanasyev/ifip-interest-flooding-ndn.pdf. 
  4. Alston, Aubrey; Refaei, Tamer (2016). "Neutralizing Interest Flooding Attacks in Named Data Networks using Cryptographic Route Tokens". IEEE 15th International Symposium on Network Computing and Applications (NCA). Cambridge, MA: IEEE. pp. 85–88. doi:10.1109/NCA.2016.7778598.