Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/69257

Registo completo
Campo DCValorIdioma
dc.contributor.authorDogruluk, Ertugrulpor
dc.contributor.authorCosta, Antóniopor
dc.contributor.authorMacedo, Joaquimpor
dc.date.accessioned2021-01-15T01:20:20Z-
dc.date.issued2018-
dc.identifier.citationDogruluk E., Costa A., Macedo J. (2018) Identifying Previously Requested Content by Side-Channel Timing Attack in NDN. In: Doss R., Piramuthu S., Zhou W. (eds) Future Network Systems and Security. FNSS 2018. Communications in Computer and Information Science, vol 878. Springer, Cham. https://doi.org/10.1007/978-3-319-94421-0_3por
dc.identifier.isbn978-3-319-94420-3por
dc.identifier.issn1865-0929-
dc.identifier.urihttps://hdl.handle.net/1822/69257-
dc.description.abstractNDN is a new name-based network paradigm. It is designed to keep the contents in the cache to increase the network efficiency. However, previously requested content may put the user privacy at risk. The time difference between cached and non-cached contents of interest responses can be used by an adversary to determine previously requested contents in cache. This attack is classified as side-channel timing attack. In NDN, it is used a signature to authenticate interests and data packets. However, signed packets does not affect the performance of side-channel timing attack. Independently of being signed or not, the adversary may identify both the sensitive and non-sensitive contents, recently cached by router. In order to mitigate side-channel attacks in NDN, there are several countermeasure methods proposed by other researchers. In this work, firstly we developed an attack scenario using ndnSIM simulator. Then we evaluated the scenario under attack and without attacks. We also proposed an adversary detection algorithm that combines three different defense countermeasures in order to maximize the cache availability.por
dc.description.sponsorshipThis work has been supported by COMPETE: POCI-01- 0145-FEDER-007043 and FCT-Fundacao ao para a Ciencia e Tecnologia within the Project Scope: UID/CEC/00319/2013.por
dc.language.isoengpor
dc.publisherSpringer Verlagpor
dc.relationinfo:eu-repo/grantAgreement/FCT/5876/147280/PTpor
dc.rightsrestrictedAccesspor
dc.subjectContent privacypor
dc.subjectNDNpor
dc.subjectSide-channel timing attackpor
dc.titleIdentifying previously requested content by side-channel timing attack in NDNpor
dc.typeconferencePaperpor
dc.peerreviewedyespor
dc.relation.publisherversionhttps://link.springer.com/chapter/10.1007%2F978-3-319-94421-0_3por
oaire.citationStartPage33por
oaire.citationEndPage46por
oaire.citationVolume878-
dc.date.updated2021-01-15T00:14:37Z-
dc.identifier.doi10.1007/978-3-319-94421-0_3por
dc.date.embargo10000-01-01-
dc.identifier.eisbn978-3-319-94421-0por
dc.subject.fosEngenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informáticapor
dc.subject.wosScience & Technologypor
sdum.export.identifier7767-
sdum.journalCommunications in Computer and Information Science-
sdum.conferencePublicationFUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018por
Aparece nas coleções:CAlg - Artigos em livros de atas/Papers in proceedings

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
Identifying Previously Requested Content by Side-Channel Timing Attack in NDN.pdf
Acesso restrito!
927,02 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID