内容中心网络兴趣包泛洪攻击对策研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
摘要:随着信息技术的飞速发展和新型网络应用的不断涌现,互联网的通信模式已经由以主机网络地址为中心的互联互通,逐渐演变为以内容为中心的信息共享,这催生了内容中心网络架构的兴起。内容中心网络直接依据内容的名字完成信息的分发和获取,网络中传输的兴趣包/数据包不携带用户的位置或身份信息,具有一定的安全优势。然而,内容中心网络仍难免遭受某些网络攻击的侵害,例如,以易于发动且危害巨大而著称的兴趣包泛洪攻击。本文围绕兴趣包泛洪攻击的两种不同类型——主流的虚假兴趣包泛洪攻击(Interest Flooding Attack with Fake Interests,IFA-F)和非主流的真实兴趣包泛洪攻击(Interest Flooding Attack with Real Interests,IFA-R),研究相应的对抗策略。论文主要工作和创新点如下:
     1)提出了IFA-F攻击危害分析理论模型。本文采用兴趣包拒绝概率表征IFA-F攻击导致的网络危害程度,推导了IFA-F攻击时单路由器和小型网络拓扑的兴趣包拒绝概率。基于此模型,本文从理论上分析了内容中心网络内容流行度分布、路由器缓存空间大小、路由器待定兴趣表大小及其条目生存时间等关键参数对IFA-F攻击所造成兴趣包拒绝概率的影响,并进行了相应的仿真验证。模型分析和仿真结果表明,IFA-F攻击导致网络兴趣包拒绝概率显著增大,降低了网络性能;网络中访问高流行度内容的兴趣包拒绝概率较低;增大路由器缓存空间或待定兴趣表容量,降低待定兴趣表条目的生存时间,均可降低IFA-F攻击时网络的兴趣包拒绝概率。
     2)本文首次提出了一种可行的IFA-F攻击探测和抑制实现方法——基于限速机制的恶意兴趣包路由器对抗策略。该对策充分利用内容中心网络路由器待定兴趣表记录兴趣包状态的特征,基于路由器待定兴趣表条目的超时情况统计IFA-F恶意兴趣包名字前缀,并通过动态调整恶意名字前缀对应的兴趣包准入速率,减轻IFA-F攻击对路由器内存资源的恶意消耗程度。性能评估结果表明,恶意兴趣包路由器对抗策略可以通过探测IFA-F恶意兴趣包的名字前缀信息,有效抑制恶意兴趣包的准入速率,从而使得路由器在遭受IFA-F攻击时仍保持基本的兴趣包转发能力。
     3)为实现细粒度的IFA-F攻击探测和抑制方案,本文提出了基于模糊逻辑和路由器协作的恶意兴趣包协同对抗策略。该对策在路由器上监测待定兴趣表使用率以及条目超时比率,并基于模糊逻辑综合判别IFA-F攻击的存在性,以实现对IFA-F攻击的探测功能;同时,通过路由器协作机制,将预警消息从探测到IFA-F攻击的路由器反馈至网络的接入路由器,最终在接入路由器处阻断恶意兴趣包,达到抑制IFA-F攻击危害的效果。基于真实网络拓扑和用户行为模型的仿真表明,恶意兴趣包协同对抗策略减轻了IFA-F攻击对路由器内存资源的恶意消耗,提高了合法兴趣包的内容获取成功率,并降低了兴趣包的内容获取时延。
     4)在分析内容中心网络现有典型兴趣包转发策略安全性的基础上,本文首次提出了一种对抗IFA-F攻击的兴趣包/数据包安全转发策略。该策略引入一种新的基于包标记技术、不依赖于待定兴趣表的兴趣包/数据包转发机制,将IFA-F恶意兴趣包从路由器待定兴趣表中彻底解耦合,并以较小的网络带宽消耗,从本质上切断了IFA-F恶意兴趣包对路由器待定兴趣表内存资源的消耗。仿真结果表明,相比基于限速机制的IFA-F攻击对抗方法,本文提出的兴趣包/数据包安全转发策略可以明显减小路由器内存资源消耗量,提高内容中心网络的IFA-F攻击对抗能力。
     5)针对非主流类型的真实兴趣包泛洪攻击——IFA-R攻击,本文提出了一种双阈值]IFA-R攻击探测方法。该方法基于探测周期内的路由器待定兴趣表超时条目数量阈值以及网络接口数据流量阈值,推断可能存在的网络流量异常,以探测IFA-R攻击的存在。仿真结果表明,双阈值IFA-R攻击探测方法在短时间内即可探测到IFA-R攻击,并成功识别出恶意兴趣包流经的路由器接口或对应网络链路。
ABSTRACT:With the rapid development of the information technology and the continuous growth of new types of applications, the communication paradigm of the Internet has shifted from the connections between hosts to the content-centric distribution and retrieval in huge amounts, which leads to the emergence of Content Centric Networking (CCN). Comparing to today's Internet architecture, CCN performs content distribution, content forwarding and retrieval only based on the content name, instead of IP address, which protects the location or identity information of the host and thus achieves better security. However, some attacks can still harm CCN. For example, CCN may suffer from the Interest Flooding Attacks (IFA), which is easy to launch and can achieve huge damage on CCN. This paper mainly focuses on the two types of IFA: Interest Flooding Attack with Fake Interests (IFA-F) and Interest Flooding Attack with Real Interests (IFA-R), and studies their corresponding countermeasures. The main contributions of this paper are as following:
     1) The analytical model for IFA-F is proposed, which evaluates the damage of IFA-F by the probability that Interest packets are denied by network (Interest-dropping probability). Based on the proposed model, the key parameters of CCN (e.g., content popularity, caching size of CCN router, size and Time-To-Live for Pending Interest Table) on shaping the damage effect of IFA-F are analyzed, and the corresponding simulations are performed. Simulation results show that IFA-F can harm CCN by bringing in abnormal Interest-dropping probability. Meanwhile, different settings for network parameters can significantly affect the damage effect of IFA-F.
     2) To simply counter IFA-F, the Router-based-Filter is proposed. It identifies the malicious name prefix that belongs to malicious Interest packets from IFA-F by monitoring the Pending Interest Table (PIT) in each router, and then limits the rate of the Interest packets which are with the malicious name prefix, to mitigate the consumption of IFA-F on router's memory resource for PIT. The performance evaluations show that the Router-based-Filter can successfully detect the IFA-F and effectively limit the incoming rate of malicious Interest packets. That is, the number of malicious Interest packets from IFA-F that can enter CCN is decreased, so the consumption on the memory resource for each involved router is decreased, making them can still perform packet forwarding even when suffering IFA-F.
     3) To counter IFA-F more effectively, the Cooperative-Filter is proposed, which counters IFA-F based on fuzzy logic as well as the cooperation between routers, and can be used in networks which need high security level. Specifically, it detects IFA-F in each router based on fuzzy logic modules, and then pushbacks the alert messages downstream to the edge routers through the cooperations between routers, to limit the incoming rate of malicious Interest packets. Moreover, the results of the simulations based on the realistic network topology and user behavior model show that the proposed Cooperative-Filter can decrease the PIT consumption rate in each involved router, and increase the Interest satisfaction rate as well as decrease the content retrieving delay.
     4) After analyzing the security performance of the current forwarding strategies in CCN, a secure Interest/Data forwarding method is proposed. It mitigates the IFA-F by directly decoupling malicious Interests from the PIT of each router, as well as designing a packet marking mechanism to make Data packet be forwarded to consumers without the help of PIT, to mitigate the consumption of IFA-F on router's memory resource for PIT. Simulation results demonstrate that the proposed method has better performance on decreasing the consumption of IFA-F on router's memory resource when comparing with the rate-limiting mechanism, and significantly improves the ability of CCN on countering IFA-F.
     5) To counter IFA-R, a double-threshold detecting method is proposed. It detects IFA-R by identifying abnormal traffic in each router, based on the threshold for the expired Interest entries in PIT of each router, as well as the traffic threshold for each interface. Simulation results show that the proposed double-threshold detecting method can quickly detect IFA-R and successfully identify the interfaces where malicious Interest packets travel through.
引文
[1]中国互联网络信息中心(CNNIC)第33次中国互联网络发展状况统计报[EB/OL]. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201301/P020140116509848228756.pdf.
    [2]B. Ahlgren, C. Dannewitz, C. Imbrebda, D. Kutscher, and B. Ohlman. A Survey of Information-Centric Networking[J]. IEEE Communications Magazine.2012,50(7):26-36.
    [3]G.Xylomenos, C.N. Ververidis, V.A. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K.V. Katsaros, and G.C. Polyzos. A Survey of Information-Centric Networking Research[J]. IEEE Communications Surveys & Tutorials.2013,50(12):44-53.
    [4]4WARD project t[EB/OL]. http://www.4ward-project.eu/.
    [5]PSIRP project[EB/OL]. http://www.psirp.org/.
    [6]PURSUIT project[EB/OL]. http://www.fp7-pursuit.eu/.
    [7]SAIL project[EB/OL]. http://www.sail-project.eu/.
    [8]German Lab[EB/OL]. http://www.german-lab.de/.
    [9]AKARI project[EB/OL]. http://akari-project.nict.go.jp/eng/index2.htm.
    [10]NSF Named Data Networking project[EB/OL]. http://named-data.net/.
    [11]张宏科,罗洪斌.智慧协同网络体系基础研究[J].电子学报.2013,41(7):1249-1254.
    [12]苏伟,陈佳,周华春,张宏科.智慧协同网络中的服务机理研究[J].电子学报.2013,41(7):1255-1260.
    [13]郜帅,王洪超,王凯,张宏科.智慧网络组件协同机制研究[J].电子学报.2013,41(7):1261-1267.
    [14]V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard. Networking Named Content[A]. Proceedings of the 5th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT 2009)[C]. Rome, Italy, Dec.2009, pp.1-12.
    [15]Content Centric Networking project[EB/OL]. http://www.ccnx.org/.
    [16]A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang. Interest Flooding Attack and Countermeasures in Named Data Networking[A]. Proceedings of IFIP Networking 2013[C]. Brooklyn, New York, USA, May 2013, pp.1-9.
    [17]M.F. Bari, S.R. Chowdhury, R. Ahmed, R. Boutaba, and M. Pomposini. A Survey of Naming and Routing in Information-Centric Networks[J]. IEEE Communications Magazine.2012, 50(12):44-53.
    [18]C. Yi, A. Afanasyev, I. Moiseenko, L. Wang, B. Zhang, and L. Zhang. A Case for Stateful Forwarding Plane[J]. Computer Communications.2013,36(7):736-749.
    [19]A. Afanasyev. Addressing Operational Challenges in Named Data Networking Through NDNS Distributed Database[D]. University of California, Los Angeles (UCLA).2013.
    [20]M. Baugher, B. Davie, A. Narayanan, and D. Oran. Self-Verifying Names for Read-Only Named Data[A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp. 274-279.
    [21]Y. Wang, K. He, H. Dai, W. Meng, J. Jiang, B. Liu, and Y. Chen. Scalable Name Lookup in NDN Using Effective Name Component Encoding[A]. IEEE 32nd International Conference on Distributed Computing Systems (ICDCS 2012)[C]. Macau, China, Jun.2012, pp.688-697.
    [22]N.L.M Adrichem and F.A. Kuipers. Globally Accessible Names in Named Data Networking[A]. Proceedings of IEEE INFOCOM 2013 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2013)[C]. Turin, Italy, Apr.2013, accepted.
    [23]G.Carofiglioa, M. Gallob, L. Muscariellob, and D. Perino. Evaluating Per-Application Storage Management in Content-Centric Networks[J]. Computer Communications.2013,36(7): 750-757.
    [24]G.Tyson, S. Kaune, S. Miles, Y. El-khatib, A. Mauthe, and A. Taweel. A Trace-Driven Analysis of Caching in Content-Centric Networks[A]. Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN 2012)[C]. Munich, Germany, Aug.2012, pp.1-7.
    [25]C. Fricker, P. Robert, J. Roberts, and N. Sbihi. Impact of Traffic Mix on Caching Performance in a Content-Centric Network[A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp.310-315.
    [26]D. Rossi and G.Rossini. On Sizing CCN Content Stores by Exploiting Topological Information[A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp. 280-285.
    [27]W.K. Chai, D. He, I. Psaras, and G.Pavlou. Cache "less for more" in information-centric networks (extended version)[J]. Computer Communications.2013,36(7):758-770.
    [28]J. Ardelius, B. Gronvall, L. Westberg, and A. Arvidsson. On the Effects of Caching in Access Aggregation Networks[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.67-72.
    [29]S. Wang, J. Bi, and J. Wu. On Performance of Cache Policy in Information-Centric Networking[A]. Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN 2012)[C]. Munich, Germany, Aug.2012, pp.1-7.
    [30]S. Saha, A. Lukyanenko, and A. Yla-Jaaski. Cooperative Caching through Routing Control in Information-Centric Networks[A]. Proceedings of IEEE INFOCOM 2013[C]. Turin, Italy, Apr. 2013, pp.100-104.
    [31]T. Janaszka, D. Bursztynowski, and M. Dzida. On Popularity-Based Load Balancing in Content Networks[A]. Proceedings of the 24th International Teletraffic Congress (ITC 2012)[C]. Krakow, Poland, Sept.2012, pp.1-8.
    [32]Y. Li, T. Lin, H. Tang, and P. Sun. A Chunk Caching Location and Searching Scheme in Content Centric Networking[A]. Proceedings of 2012 IEEE International Conference on Communications (IEEE ICC 2012)[C]. Ottawa, ON, Canada, Jun.2012, pp.2655-2659.
    [33]Z. Ming, M. Xu, and D. Wang. Age-based Cooperative Caching in Information-Centric Networks[A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp. 268-273.
    [34]K. Cho, M. Lee, K. Park, T.T. Kwon, Y. Choi, and S. Pack. WAVE:Popularity-based and Collaborative In-network Caching for Content-Oriented Networks[A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp.316-321.
    [35]I. Psaras, W.K. Chai, and G.Pavlou. Probabilistic In-Network Caching for Information-Centric Networks[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.55-60.
    [36]J.M. Wang, J. Zhang, and B. Bensaou. Intra-AS Cooperative Caching for Content-Centric Networks[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug.2013, pp.61-66.
    [37]D. Perino, M. Varvello, and K.P.N. Puttaswamy. ICN-RE:Redundancy Elimination for Information-Centric Networking[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.91-96.
    [38]E.J. Rosensweig, D.S. Menasche, and J. Kurose. On the Steady-State of Cache Networks[A]. Proceedings of IEEE INFOCOM 2013[C]. Turin, Italy, Apr.2013, pp.863-871.
    [39]L. Muscariello, G.Carofiglio, and M. Gallo. Bandwidth and Storage Sharing Performance in Information Centric Networking[A]. Proceedings of the ACM SIGCOMM 2011 Workshop on Information-Centric Networking (ICN 2011)[C]. Toronto, ON, Canada, Aug.2011, pp.26-31.
    [40]G.Carofiglio, M. Gallo, L. Muscariello, and D. Perino. Modeling Data Transfer in Content-Centric Networking[A]. Proceedings of the 23rd International Teletraffic Congress (ITC)[C]. San Francisco, USA, Sept.2011, pp.111-118.
    [41]Technical Report:Modeling Data Transfer in Content-Centric Networking (extended version)[EB/OL]. http://perso.rd.francetelecom.fr/muscariello/report-itc-transport.pdf.
    [42]I. Psaras, R.G.Clegg, R. Landa, W.K. Chai, and G.Pavlou. Modelling and Evaluation of CCN-caching Trees[A]. Proceedings of the 10th international IFIP TC 6 conference on Networking[C]. Valencia, Spain, May 2011, pp.78-91.
    [43]Z. Li, G.Simon, and A. Gravey. Caching Policies for In-Network Caching[A]. Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN 2012)[C]. Munich, Germany, Aug.2012, pp.1-7.
    [44]D. Perino and M. Varvello. A Reality Check for Content Centric Networking[A]. Proceedings of the ACM SIGCOMM 2011 Workshop on Information-Centric Networking (ICN 2011)[C]. Toronto, ON, Canada, Aug.2011, pp.44-49.
    [45]S.K. Fayazbakhsh, Y. Lin, A. Tootoonchian, A. Ghodsi, T. Koponen, B.M. Maggs, K.C. Ng, V. Sekar, and S. Shenker. Less Pain, Most of the Gain:Incrementally Deployable ICN[A]. Proceedings of ACM SIGCOMM 2013[C]. Hong Kong, China, Aug.2013, pp.147-158.
    [46]T. Tsutsui, H. Urabayashi, M. Yamamoto, E. Rosensweig, and J.F. Kurose. Performance Evaluation of Partial Deployment of Breadcrumbs in Content Oriented Networks[A]. Proceedings of 2012 IEEE International Conference on Communications (IEEE ICC 2012)[C]. Ottawa, ON, Canada, Jun.2012, pp.5828-5832.
    [47]NDN Technical Report:Named Data Networking (NDN) Project 2010-2011 Progress Summary[EB/OL]. http://named-data.net/project/ndn-ar2011-html/.
    [48]NDN Technical Report:Chronos:Serverless Multi-User Chat Over NDN[EB/OL]. http://named-data.net/publications/techreports/trchronos/.
    [49]Z. Zhu, S. Wang, X. Yang, V. Jacobson, and L. Zhang. ACT:Audio Conference Tool Over Named Data Networking[A]. Proceedings of the ACM SIGCOMM 2011 Workshop on Information-Centric Networking (ICN 2011)[C]. Toronto, ON, Canada,Aug.2011, pp.68-73.
    [50]V. Ciancaglini, G. Piro, R. Loti, L.A. Griecoy, and L. Liquori. CCN-TV:a Data-Centric Approach to Real-time Video Services[A]. Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA 2013)[C]. Barcelona, Catalonia, Spain, Mar.2013, pp.982-989.
    [51]NDN Technical Report:FileSync/NDN:Peer-to-Peer File Sync over Named Data Networking[EB/OL]. http://named-data.net/publications/techreports/trfilesync/.
    [52]Z. Zhu and A. Afanasyev. Let's ChronoSync:Decentralized Dataset State Synchronization in Named Data Networking[A]. Proceedings of the 21st IEEE International Conference on Network Protocols (ICNP 2013)[C], Gottingen, Germany, Oct.2013, pp.11-17.
    [53]A. Detti, B. Ricci, and N. Blefari-Melazzi. Supporting Mobile Applications with Information Centric Networking:the Case of P2P Live Adaptive Video Streaming[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug.2013, pp.35-36.
    [54]W. Shang, J. Thompsonz, M. Cherkaoui, J. Burkey, and L. Zhang. NDN.JS:A JavaScript Client Library for Named Data Networking[A]. Proceedings of IEEE INFOCOM 2013 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2013)[C]. Turin, Italy, Apr. 2013, accepted.
    [55]B. Mathieu, P. Truong, W. You, and J.F. Peltier. Information-Centric Networking:A Natural Design for Social Network Applications[J]. IEEE Communications Magazine.2012,50(7): 44-51.
    [56]B. Han, X. Wang, N. Choi, T.T. Kwon, and Y. Choi. AMVS-NDN:Adaptive Mobile Video Streaming and Sharing in Wireless Named Data Networking[A]. Proceedings of IEEE INFOCOM 2013 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2013)[C]. Turin, Italy, Apr.2013, accepted.
    [57]C. Stais, Y. Thomas, G.Xylomenos, and C. Tsilopoulos. Networked Music Performance over Information-Centric Networks[A]. Proceedings of 2013 IEEE International Conference on Communications (IEEE ICC 2013) Workshop on Immersive & Interactive Multimedia Communications over the Future Internet[C]. Budapest, Hungary, Jun.2013, pp.647-651.
    [58]J. Burke, P. Gasti, N. Nathan, and G.Tsudik. Securing Instrumented Environments over Content-Centric Networking:the Case of Lighting Control [A]. Proceedings of IEEE INFOCOM 2013 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2013)[C]. Turin, Italy, Apr.2013, accepted.
    [59]L. Galluccio, G.Morabito, and S. Palazzo. Caching in Information-Centric Satellite Networks[A]. Proceedings of 2012 IEEE International Conference on Communications (IEEE ICC 2012)[C]. Ottawa, ON, Canada, Jun.2012, pp.3306-3310.
    [60]NDN Technical Report:ndnSIM:NDN simulator for NS-3[EB/OL]. http://named-data.net/publications/techreports/trndnsim/.
    [61]ns-3[EB/OL]. https://www.nsnam.org/.
    [62]ndnSIM[EB/OL]. http://ndnsim.net/.
    [63]C.M.S. Cabral, C.E. Rothenberg, M.F. Magalhaes. Mini-CCNx:Fast Prototyping for Named Data Networking[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug.2013, pp.33-34.
    [64]Mini-CCNx[EB/OL]. https://github.com/carlosmscabral/mn-ccnx.
    [65]CCNx[EB/OL]. https://www.ccnx.org/.
    [66]H. Yuan, T. Song, and P. Crowley. Scalable NDN Forwarding:Concepts, Issues and Principles[A]. Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN 2012)[C]. Munich, Germany, Aug.2012, pp.1-9.
    [67]R. Chiocchetti, D. Perino, G.Carofiglio, D. Rossi, and G.Rossini. INFORM:a Dynamic Interest Forwarding Mechanism for Information Centric Networking[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug.2013, pp.9-14.
    [68]G.Rossini and D. Rossi. Evaluating CCN Multi-path Interest Forwarding Strategies[J]. Computer Communications.2013,36(7):771-778.
    [69]M. Varvello, D. Perino, and J. Esteban. Caesar:a Content Router for High Speed Forwarding [A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.73-78.
    [70]S. DiBenedetto, C. Papadopoulos, and D. Massey. Routing Policies in Named Data Networking[A]. Proceedings of the ACM SIGCOMM 2011 Workshop on Information-Centric Networking (ICN 2011)[C]. Toronto, ON, Canada, Aug.2011, pp.38-43.
    [71]NDN Technical Report:OSPFN:An OSPF Based Routing Protocol for Named Data Networking[EB/OL]. http://named-data.net/publications/techreports/trospfn/.
    [72]J. Moy. OSPF Version 2[S]. IETF Internet Standard, RFC 2328, Apr.1998.
    [73]A.K.M.M. Hoque, S.O. Amin, A. Alyyan, B. Zhang, L. Zhang, and L. Wang. NLSR: Named-data Link State Routing Protocol[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug.2013, pp.3-8.
    [74]Y. Kim, J. An, and Y.H. Lee. CCNFRR:Fast one-hop Re-Route in CCN [A]. Proceedings of 2012 IEEE International Conference on Communications (IEEE ICC 2012)[C]. Ottawa, ON, Canada, Jun.2012, pp.5799-5803.
    [75]Y. Wang, K. Lee, B. Venkataraman, R.L. Shamanna, I. Rhee, and S. Yang. Advertising Cached Contents in the Control Plane:Necessity and Feasibility[A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp.286-291.
    [76]R. Chiocchetti, D. Rossi, G.Rossini, G.Carofiglio, and D. Perino. Exploit the Known or Explore the Unknown Hamlet-Like Doubts in ICN[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug. 2012, pp.7-12.
    [77]A. Detti, M. Pomposini, N. Blefari-Melazzi, and S. Salsano. Supporting the Web with an Information Centric Network that Routes by Name[J]. Computer Networks.2012,56(17): 3705-3722.
    [78]N. Rozhnova and S. Fdida. An effective hop-by-hop Interest shaping mechanism for CCN communications [A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp. 322-327.
    [79]Y. Wang, N. Rozhnova, A. Narayanan, D. Oran, and I. Rhee. An Improved Hop-by-hop Interest Shaper for Congestion Control in Named Data Networking[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug.2013, pp.55-60.
    [80]G.Carofiglio, M. Gallo, and L. Muscariello. ICP:Design and Evaluation of an Interest Control Protocol for Content-Centric Networking[A]. Proceedings of IEEE INFOCOM 2012 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2012)[C]. Orlando, FL, USA, Mar.2012, pp.304-309.
    [81]G.Carofiglio, M. Gallo, and L. Muscariello. Joint Hop-by-hop and Receiver-Driven Interest Control Protocol for Content-Centric Networks[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.37-42.
    [82]G.Carofiglio, M. Gallo, L. Muscariello, and M. Papalini. Multipath Congestion Control in Content-Centric Networks[A]. Proceedings of IEEE INFOCOM 2013 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2013)[C]. Turin, Italy, Apr.2013, accepted.
    [83]D. Kim, J. Kim, Y. Kim, H. Yoon, and I. Yeom. Mobility Support in Content Centric Networks[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.13-17.
    [84]J. Lee, S. Cho, and D. Kim. Device Mobility Management in Content-Centric Networking[J]. IEEE Communications Magazine.2012,50(12):28-34.
    [85]R. Ravindran, S. Lo, X. Zhang, and G.Wang. Supporting Seamless Mobility in Named Data Networking[A]. Proceedings of 2012 IEEE International Conference on Communications (IEEE ICC 2012)[C]. Ottawa, ON, Canada, Jun.2012, pp.5854-5859.
    [86]X. Vasilakos, V.A. Siris, G.C. Polyzos, and M. Pomonis. Proactive Selective Neighbor Caching for Enhancing Mobility Support in Information-Centric Networks[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.61-66.
    [87]Z. Zhu. Support Mobile and Distributed Applications with Named Data Networking[D]. University of California, Los Angeles (UCLA).2013.
    [88]I. Widjaja. Towards a Flexible Resource Management System for Content Centric Networking[A]. Proceedings of 2012 IEEE International Conference on Communications (IEEE ICC 2012)[C]. Ottawa, ON, Canada, Jun.2012, pp.2634-2638.
    [89]M. Wahlischa, T.C. Schmidtb, and M. Vahlenkampb. Backscatter from the Data Plane-Threats to Stability and Security in Information-Centric Network Infrastructure[J]. Computer Networks. 2013,57(16):3192-3206.
    [90]M. Wahlischa, T.C. Schmidtb, and M. Vahlenkampb. Lessons from the Past:Why Data-driven States Harm Future Information-Centric Networking[A]. Proceedings of IFIP Networking 2013[C]. Brooklyn, New York, USA, May 2013, pp.1-9.
    [91]P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS & DDoS in Named-Data Networking[A]. Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN 2013)[C]. Nassau, Bahamas, Aug.2012, pp.1-7.
    [92]T. Lauinger. Security & Scalability of Content-Centric Networking[D]. TU Darmstadt, Darmstadt, Germany,2010.
    [93]K. Wang, J. Chen, H. Zhou, Y. Qin and H. Zhang. Effect of Denial-of-Service Attacks on Named Data Networking[J]. ICIC Express Letters.2013,7(7):2135-2140.
    [94]K. Wang, J. Chen, H. Zhou, Y. Qin and H. Zhang. Modeling Denial-of-Service against Pending Interest Table in Named Data Networking[J]. International Journal of Communication Systems. 2013, published online, DOI:10.1002/dac.2618.
    [95]K. Wang, J. Chen, H. Zhou and Y. Qin. Content-Centric Networking:Effect of Content Caching on Mitigating DoS Attack[J]. International Journal of Computer Science Issues.2012,9(6): 43-52.
    [96]K. Wang, H. Zhou, H. Luo, J. Guan, Y. Qin and H. Zhang. Detecting and Mitigating Interest Flooding Attacks in Content-Centric Network[J]. Security and Communication Networks.2013, 7(4):685-699.
    [97]H. Dai, Y. Wang, J. Fan, and B. Liu. Mitigate DDoS Attacks in NDN by Interest Traceback[A]. Proceedings of IEEE INFOCOM 2013 Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN 2013)[C]. Turin, Italy, Apr.2013, accepted.
    [98]A. Compagno, M. Conti, P. Gasti, and G.Tsudik. Poseidon:Mitigating Interest Flooding DDoS Attacks in Named Data Networking[A]. Proceedings of the 38th IEEE Conference on Local Computer Networks (IEEE LCN 2013) [C]. Sydney, Australia, Oct.2013, accepted.
    [99]M. Xie, I. Widjaja, and H. Wang. Enhancing cache robustness for content-centric networking[A]. Proceedings of IEEE INFOCOM 2012[C]. Orlando, FL, USA, Mar.2012, pp. 2426-2434.
    [100]K. Wang, H. Zhou, J. Chen, Y. Qin and H. Zhang. Cooperative-Filter:Countering Interest Flooding Attacks in Named Data Networking[J]. Soft Computing.2013, published online, 10.1007/s00500-014-1275-z.
    [101]K. Wang, J. Chen, H. Zhou, Y. Qin and H. Zhang. Decoupling Malicious Interests from Pending Interest Table to Mitigate Interest Flooding Attacks[A]. Proceedings of the IEEE Globecom 2013 workshop MENS, published.
    [102]K. Wang, H. Zhou, J. Chen, Y. Qin. RDAI:Router-based Data Aggregates Identification Mechanism for Named Data Networking[A]. Proceedings of the 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013)[C]. Taichung, Taiwan, Jul.2013, pp.116-121.
    [103]H. Park, I. Widjaja, and H. Lee. Detection of Cache Pollution Attacks using Randomness Checks[A]. Proceedings of 2012 IEEE International Conference on Communications (IEEE ICC 2012)[C]. Ottawa, ON, Canada, Jun.2012, pp.1096-1100.
    [104]K.R. Sollins. Pervasive Persistent Identification for Information Centric Networking[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.1-6.
    [105]G.Acs, M. Conti, P. Gasti, C. Ghali, and G.Tsudik. Cache Privacy in Named-Data Networking[A]. IEEE 33rd International Conference on Distributed Computing Systems (ICDCS 2013)[C]. Philadelphia, PA, USA, Jun.2012, pp.41-51.
    [106]S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker. On Preserving Privacy in Content-Oriented Networks[A]. Proceedings of the ACM SIGCOMM 2011 Workshop on Information-Centric Networking (ICN 2011)[C]. Toronto, ON, Canada, Aug.2011, pp.19-24.
    [107]S. Misra, R. Tourani, and N.E. Majd. Secure Content Delivery in Information-Centric Networks:Design, Implementation, and Analyses[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug. 2013, pp.73-78.
    [108]N. Fotiou, G.F. Marias, and G.C. Polyzos. Access Control Enforcement Delegation for Information-Centric Networking Architectures[A]. Proceedings of the ACM SIGCOMM 2012 Workshop on Information-Centric Networking (ICN 2012)[C]. Helsinki, Finland, Aug.2012, pp.85-90.
    [109]H. Dai, B. Liu, Y. Chen, and Y. Wang. On Pending Interest Table in Named Data Networking[A]. Proceedings of the 8th ACM/IEEE symposium on Architectures for Networking and Communications Systems (ANCS 2012)[C]. Austin, TX, USA, Oct.2012, pp.211-222.
    [110]M. Virgilio, G Marchetto, and R. Sisto. PIT Overload Analysis in Content Centric Networks[A]. Proceedings of the ACM SIGCOMM 2013 Workshop on Information-Centric Networking (ICN 2013)[C]. Hong Kong, China, Aug.2013, pp.67-72.
    [111]L. Zadeh. Fuzzy Sets[J]. Information and Control.1965,8(3):338-353.
    [112]R.G Clegg, C.D. Cairano-Gilfedder, and S.Zhou. A Critical Look at Power Law Modelling of the Internet[J]. Computer Communications.2009,33(3):259-268.
    [113]C.D. Cairano-Gilfedder and R.G Clegg. A Decade of Internet Research:Advances in Models and Practices[J]. BT Technology Journal.2005,23(4):115-128.
    [114]Y. Gao, L. Deng, A. Kuzmanovic and Y. Chen. Internet Cache Pollution Attacks and Countermeasures[A]. Proceedings of the 14th IEEE International Conference on Network Protocols (IEEE ICNP 2006)[C]. Santa Barbara, CA, USA, Nov.2006, pp.54-64.
    [115]R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling High Bandwidth Aggregates in the Network[J]. ACM SIGCOMM Computer Communication Review.2002,32(3):62-73.
    [116]E.H. Mamdani and S. Assilian. An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller[J]. International Journal of Man-Machine Studies.1975,7(1):1-13.
    [117]N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP Topologies with Rocketfuel[J]. IEEE/ACM Transactions on Networking (TON).2004,12(1):2-16.
    [118]A. Dan, D. Towsley. An Approximate Analysis of the LRU and FIFO Buffer Replacement Schemes[A]. Proceedings of the 1990 ACM SIGMETRICS[C]. Boulder, CO, USA, May 1990, pp.143-152.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700