Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 4541975, 12 pages
https://doi.org/10.1155/2017/4541975
Research Article

Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking

1State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2School of Computer Sciences and Technology, Communication University of China, Beijing 100024, China
3Department of Information and Electronic Engineering, Muroran Institute of Technology, 27-1 Mizumoto-cho, Muroran, Hokkaido 050-8585, Japan
4Anyang Normal University, Anyang, Henan 455002, China

Correspondence should be addressed to Licheng Wang; moc.621@2102clgnaw

Received 14 February 2017; Accepted 18 April 2017; Published 7 June 2017

Academic Editor: Zonghua Zhang

Copyright © 2017 Licheng Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, “DoS and DDoS in named data networking,” in Proceedings of the 2013 IEEE 2013 22nd International Conference on Computer Communication and Networks, ICCCN 2013, bhs, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley, “The design and implementation of an intentional naming system,” ACM SIGOPS Operating Systems Review, vol. 33, no. 5, pp. 186–201, 1999. View at Publisher · View at Google Scholar
  3. N. Tolia, M. Kaminsky, and D. Andersen, “An architecture for Internet data transfer,” in Proceedings of the 3rd conference on Networked Systems Design Implementation (NSDI, pp. 253–266, 2006.
  4. T. Koponen, M. Chawla, B.-G. Chun et al., “A data-oriented (and beyond) network architecture,” in Proceedings of the ACM SIGCOMM 2007: Conference on Computer Communications, pp. 181–192, jpn, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, I. Stoica, and S. Shenker, “ROFL: routing on flat labels,” in Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 363–374, 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana, “Internet indirection infrastructure,” IEEE/ACM Transactions on Networking, vol. 12, no. 2, pp. 205–218, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. Project PSIRP. http://www.psirp.org, 2010.
  8. V. Jacobson, “Special plenary invited short course: (CCN) Content-centric networking,” in Future Internet Summer School, Germany, Bremen, 2009. View at Google Scholar
  9. Project CCNx. http://www.ccnx.org, 2011.
  10. V. Jacobson, D. Smetters K, J. Thorton D et al., “Networking named content,” Communications of the ACM, vol. 55, no. 1, pp. 117–124, 2012. View at Google Scholar
  11. A. Juels and J. Brainard, “Client puzzles: a cryptographic defense against connection depletion attacks,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 151–165, 1999.
  12. V. Jacobson, D. K. Smetters, N. H. Briggs et al., “VoCCN: Voice-over content-centric networks,” in Proceedings of the 2009 workshop on Re-architecting the internet, pp. 1–6, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Zhang and D. Estrin, “Named data networking (NDN,” Tech. Rep., 2010. View at Google Scholar
  14. Z. Zhu, S. Wang, X. Yang, V. Jacobson, and L. Zhang, “ACT: audio conference tool over named data networking,” in Proceedings of the 2011 ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2011, Co-located with SIGCOMM 2011, pp. 68–73, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Yuan and P. Crowley, “Experimental evaluation of content distribution with NDN and HTTP,” in Proceedings of the IEEE INFOCOM 2013 Mini-Conference, pp. 240–244, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Afanasyev, I. Moiseenko, and L. Zhang, “ndnSIM, NDN simulator for NS-3,” Tech. Rep., 2012. View at Google Scholar
  17. A. Atanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang, “Interest flooding attack and countermeasures in named data networking,” in Proceedings of the IFIP Networking, pp. 1–9, 2013.
  18. D. Mankins, R. Krishnan, C. Boyd, J. Zao, and M. Frentz, “Mitigating distributed denial of service attacks with dynamic resource pricing,” in Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC 2001, pp. 411–421, usa, December 2001. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Abadi, M. Burrows, M. Manasse, and T. Wobber, “Moderately hard, memory-bound functions,” in Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS), pp. 25–39, Internet Society, 2003.
  20. C. Dwork and M. Naor, “Pricing via processing or combatting junk mail,” in Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), pp. 139–147, Springer-Verlag, London, UK, 1992.
  21. Y. Shen, F. Fan, W. Xie, and L. Mo, “Re-Traffic pricing for fighting against DDoS,” in Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM), pp. 332–336, IEEE Computer Society, Washington, DC, USA, 2008.
  22. R. Rivest and A. Shamir, “PayWord and MicroMint: Two Simple Micro-payment Schemes, Proceeding of the Security Protocols Workshop,” Lecture Notes in Computer Science, vol. 1189, pp. 69–87, 1997. View at Google Scholar
  23. S. C. Glassman, M. S. Manasse, M. Abadi, P. Gauthier, and P. Sobalvarro, “The Millicent protocol for inexpensive electronic commerce,” World Wide Web, vol. 1, no. 1, 1996, https://www.w3.org/Conferences/WWW4/Papers/246/. View at Google Scholar
  24. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System. http://bitcoin.org.
  25. S. Khanna, S. S. Venkatesh, O. Fatemieh, F. Khan, and C. A. Gunter, “Adaptive selective verification: An efficient adaptive countermeasure to thwart DoS attacks,” IEEE/ACM Transactions on Networking, vol. 20, no. 3, pp. 715–728, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. Q. Liu, R. Safavi-Naini, and N. P. Sheppard, “Digital rights management for content distribution,” in Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 (ACSW Frontiers 2003), vol. 21, pp. 49–58, Australian Computer Society, 2003.