A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures

ELECTRONICS(2022)

引用 2|浏览5
暂无评分
摘要
One key feature of named data networks (NDN) is supporting in-network caching to increase the content distribution for today's Internet needs. However, previously cached contents may be threatened by side-channel timing measurements/attacks. For example, one adversary can identify previously cached contents by distinguishing between uncached and cached contents from the in-network caching node, namely the edge NDN router. The attacks can be mitigated by the previously proposed methods effectively. However, these countermeasures may be against the NDN paradigm, affecting the content distribution performance. This work studied the side-channel timing attack on streaming over NDN applications and proposed a capable approach to mitigate it. Firstly, a recent side-channel timing attack, designated by brute-force, was implemented on ndnSIM using the AT&T network topology. Then, a multi-level countermeasure method, designated by detection and defense (DaD), is proposed to mitigate this attack. Simulation results showed that DaD distinguishes between legitimate and adversary nodes. During the attack, the proposed DaD multi-level approach achieved the minimum cache hit ratio (approximate to 0.7%) compared to traditional countermeasures (approximate to 4.1% in probabilistic and approximate to 3.7% in freshness) without compromising legitimate requests.
更多
查看译文
关键词
named data networks, cache privacy, side-channel timing attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要