Forwarding loop attacks and counter measures in content centric networks
dc.contributor.advisor | Yong Guan | |
dc.contributor.author | Velijala, S Sarat Chandra | |
dc.contributor.department | Electrical and Computer Engineering | |
dc.date | 2018-08-11T07:45:45.000 | |
dc.date.accessioned | 2020-06-30T03:02:03Z | |
dc.date.available | 2020-06-30T03:02:03Z | |
dc.date.copyright | Fri Jan 01 00:00:00 UTC 2016 | |
dc.date.embargo | 2001-01-01 | |
dc.date.issued | 2016-01-01 | |
dc.description.abstract | <p>Content Centric Networking(CCN) is a novel networking approach that aims at overcoming some of the limitations of the current Internet. In particular, CCN aims at providing better security and privacy by focusing on the data rather than on the location of data. However, this new networking concept opens up avenues for launching several new types of attacks including the “Forwarding Loop attacks”.</p> <p>This paper describes how malicious customers can attack the availability of Content Centric Networks (CCNs) by creating forwarding loops. These loops cause one request to be processed repeatedly or even indefinitely, resulting in unwanted resource consumption and potential Denial-of-Service attacks. Next, we propose detection and mitigation techniques that will allow routers to identify and prevent the formation of such loops. To evaluate the practicality of such forwarding-loop attacks, we use the popular CCN simulation software, ndnSIM to simulate the occurrences of the loops and show how they can affect the overall service of the network.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/etd/15184/ | |
dc.identifier.articleid | 6191 | |
dc.identifier.contextkey | 8943286 | |
dc.identifier.doi | https://doi.org/10.31274/etd-180810-4787 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | etd/15184 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/29368 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/etd/15184/Velijala_iastate_0097M_15514.pdf|||Fri Jan 14 20:36:55 UTC 2022 | |
dc.subject.disciplines | Computer Engineering | |
dc.subject.keywords | Computer Engineering | |
dc.title | Forwarding loop attacks and counter measures in content centric networks | |
dc.type | article | |
dc.type.genre | thesis | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.discipline | Computer Engineering | |
thesis.degree.level | thesis | |
thesis.degree.name | Master of Science |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Velijala_iastate_0097M_15514.pdf
- Size:
- 846.75 KB
- Format:
- Adobe Portable Document Format
- Description: