Utilize este identificador para referenciar este registo:
https://hdl.handle.net/1822/69258
Registo completo
Campo DC | Valor | Idioma |
---|---|---|
dc.contributor.author | Dogruluk, Ertugrul | por |
dc.contributor.author | Costa, António | por |
dc.contributor.author | Macedo, Joaquim | por |
dc.date.accessioned | 2021-01-15T01:26:29Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | E. Dogruluk, A. Costa and J. Macedo, "A Detection and Defense Approach for Content Privacy in Named Data Network," 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), CANARY ISLANDS, Spain, 2019, pp. 1-5, doi: 10.1109/NTMS.2019.8763835. | por |
dc.identifier.isbn | 9781728115429 | por |
dc.identifier.issn | 2157-4952 | - |
dc.identifier.uri | https://hdl.handle.net/1822/69258 | - |
dc.description.abstract | The Named Data Network (NDN) is a promising network paradigm for content distribution based on caching. However, it may put consumer privacy at risk, as the adversary may identify the content, the name and the signature (namely a certificate) through side-channel timing responses from the cache of the routers. The adversary may identify the content name and the consumer node by distinguishing between cached and uncached contents. In order to mitigate the timing attack, effective countermeasure methods have been proposed by other authors, such as random caching, random freshness, and probabilistic caching. In this work, we have implemented a timing attack scenario to evaluate the efficiency of these countermeasures and to demonstrate how the adversary can be detected. For this goal, a brute force timing attack scenario based on a real topology was developed, which is the first brute force attack model applied in NDN. Results show that the adversary nodes can be effectively distinguished from other legitimate consumers during the attack period. It is also proposed a multi-level mechanism to detect an adversary node. Through this approach, the content distribution performance can be mitigated against the attack. | por |
dc.description.sponsorship | This work has been supported by FCT -Fundacao para a Ciencia e Tecnologia within the Project Scope: UID/CEC/00319/2019 | por |
dc.language.iso | eng | por |
dc.publisher | IEEE | por |
dc.relation | UID/CEC/00319/2019 | por |
dc.rights | restrictedAccess | por |
dc.subject | NDN | por |
dc.subject | content privacy | por |
dc.subject | side-channel timing attack | por |
dc.subject | attack detection | por |
dc.title | A detection and defense approach for content privacy in named data network | por |
dc.type | conferencePaper | por |
dc.peerreviewed | yes | por |
dc.relation.publisherversion | https://ieeexplore.ieee.org/document/8763835 | por |
dc.date.updated | 2021-01-15T00:16:56Z | - |
dc.identifier.doi | 10.1109/NTMS.2019.8763835 | por |
dc.date.embargo | 10000-01-01 | - |
dc.subject.fos | Engenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informática | por |
dc.subject.wos | Science & Technology | - |
sdum.export.identifier | 7768 | - |
sdum.journal | International Conference on New Technologies Mobility and Security | - |
sdum.conferencePublication | 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS) | por |
sdum.bookTitle | 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS) | - |
Aparece nas coleções: |
Ficheiros deste registo:
Ficheiro | Descrição | Tamanho | Formato | |
---|---|---|---|---|
A Detection and Defense Approach for Content Privacy in Named Data Network.pdf Acesso restrito! | 223,19 kB | Adobe PDF | Ver/Abrir |