Utilize este identificador para referenciar este registo:
https://hdl.handle.net/1822/52638
Registo completo
Campo DC | Valor | Idioma |
---|---|---|
dc.contributor.author | Dogruluk, Ertugrul | por |
dc.contributor.author | Costa, António | por |
dc.contributor.author | Macedo, Joaquim | por |
dc.date.accessioned | 2018-03-16T15:37:13Z | - |
dc.date.issued | 2016 | - |
dc.identifier.isbn | 978-1-5090-0679-3 | - |
dc.identifier.uri | https://hdl.handle.net/1822/52638 | - |
dc.description.abstract | The main usage pattern of the Internet is changing from end-to-end communication to content distribution and access. To support this change, the actual Internet has several add-on as Content Delivery Networks (CDNs) and Web caches.To have a native support architecture for content distribution, clean state information-centric networking is being proposed for Future Internet. The Named Data Network (NDN) is one of the most promising information-centric networking architecture. The in-network storage (aka caches) capability of ICNs and content name visibility bring more efficiency and lower traffic to the network for content distribution.However, the human-readable naming and in-network storage of data increase the opportunity and possible victims of cache privacy attacks. The most used attack type is called timing attack.Based on the hypothesis that almost all timing attacks are detectable, this work proposes a mechanism for turning on a random cache delay model only when a cache privacy attack is detected. Otherwise, there is not any additional delay. The rationale of this approach is to establish a tradeoff between the network efficiency and cache privacy guarantee. In comparison with other works proposed in the literature, the network efficiency is less affected. | por |
dc.language.iso | eng | por |
dc.publisher | IEEE | por |
dc.rights | restrictedAccess | por |
dc.subject | Named Data Networking | por |
dc.subject | Privacy | por |
dc.subject | Cache Attacks | por |
dc.title | Evaluating privacy attacks in named data network | por |
dc.type | conferencePaper | por |
dc.peerreviewed | yes | por |
dc.relation.publisherversion | http://ieeexplore.ieee.org/abstract/document/7543908/?reload=true | por |
oaire.citationStartPage | 1251 | por |
oaire.citationEndPage | 1256 | por |
oaire.citationConferencePlace | Messina, Italy | por |
dc.date.updated | 2018-03-02T17:56:40Z | - |
dc.identifier.doi | 10.1109/ISCC.2016.7543908 | por |
dc.subject.fos | Ciências Naturais::Ciências da Computação e da Informação | por |
dc.description.publicationversion | info:eu-repo/semantics/publishedVersion | por |
dc.subject.wos | Science & Technology | - |
sdum.export.identifier | 4161 | - |
sdum.journal | Proceedings - IEEE Symposium on Computers and Communications | por |
sdum.conferencePublication | 2016 IEEE Symposium on Computers and Communication (ISCC) | por |
sdum.bookTitle | 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC) | por |
Aparece nas coleções: |
Ficheiros deste registo:
Ficheiro | Descrição | Tamanho | Formato | |
---|---|---|---|---|
Ertugul-paper.pdf Acesso restrito! | 339,64 kB | Adobe PDF | Ver/Abrir |