On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table
نویسندگان
چکیده
Named Data Networking (NDN) is one the proposals for the Future Internet design relying on the Information Centric Networking paradigm and probably the most promising. To enable a large-scale deployment by Internet Service Providers, however, a well-established security is fundamental. While numerous prior works study the security of NDN, a large amount of those works have been conducted using simulation frameworks which prevent the consideration of potential threats and aws in a real deployment context. Toward this e ort, this paper studies the practical vulnerabilities exposed by NDN Forwarding Daemon (NFD), the current implementation of NDN, and especially its Pending Interest Table. An attack scenario, based on the Interest Flooding Attack, is implemented on NFD routers deployed in a Network Function Virtualization environment. We show that the current implementation, though designed to be exible, has some aws that can ease the mounting of attacks in a real NDN network. We have found that there is no mechanism to protect NFD router when Pending Interest Table (PIT) is overloaded and identi ed the set of parameters which can increase the attack success. Several recommendations are proposed for the security of future implementations.
منابع مشابه
Compression of Pending Interest Table with Adaptive Prefix Bloom Filter in Named Data Networking
In the recent years, Named Data Networking (NDN) become more popular which is the complementary design of the traditional IP architecture. NDN gives more importance to content rather than the data hosts. It enables the end user to give a data content request with no knowledge about the hosting entity. It manages user mobility, highly secure, flexible and scalable than the conventional Internet....
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملFIA: Collaborative Research: Named Data Networking (NDN)
2 Architecture 2 2.1 Architectural Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 The NDN Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2.1 Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2.2 Data-Centric Security . . . . . . . . . . . . . . . . ...
متن کاملHardware accelerator to speed up packet processing in NDN router
A hardware implementation of the pending interest table (PIT) for named data networking (NDN) is presented. One of the major challenges in this research is the per-packet update requirement in NDN packet processing. In general, the data structure of the lookup table is optimized in order to minimize the implementation cost and maximize the lookup performance. However, more computation steps are...
متن کاملLeveraging the Pending Interest Table Occupancy for Congestion Control in CCN
Recent studies have shown that the occupancy of the pending interest table (PIT) in content-centric networks (CCN), named-data networks (NDN) and other informationcentric networking (ICN) architectures has an undeniable effect not only on the network performance but also on the congestion level. Despite CCN’s in-network caching and interest aggregation for improving network performance, congest...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016