Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/1271
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNakatsuka, Y-
dc.contributor.authorWijekoon, J-
dc.contributor.authorNishi, H-
dc.date.accessioned2022-02-18T08:59:58Z-
dc.date.available2022-02-18T08:59:58Z-
dc.date.issued2018-05-25-
dc.identifier.citationY. Nakatsuka, J. L. Wijekoon and H. Nishi, "FROG: A Packet Hop Count based DDoS Countermeasure in NDN," 2018 IEEE Symposium on Computers and Communications (ISCC), 2018, pp. 00492-00497, doi: 10.1109/ISCC.2018.8538468.en_US
dc.identifier.issn1530-1346-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/1271-
dc.description.abstractNamed Data Networking (NDN) is a promising inter-networking paradigm that focus on content rather than hosts and their physical locations. In NDN Consumers issue Interests for Contents. Producers generate a content in response to each received interest and such content is routed back to the requesting consumer. When compared to IP, NDN brings advantages such as better throughput and lower latency, because routers are able to cache popular contents and satisfy interests for such contents locally. However, before being considered a viable approach, NDN should offer security services that are ideally better, but at least equivalent to current mechanisms in IP.In this regard, mechanisms to prevent DDoS are of paramount importance. In this work we propose FROG: a simple yet effective Interest Flooding Attack (IFA) detection and mitigation method. FROG runs on routers that are directly connected to NDN consumers and monitors packet hop counts. It then calculates mean and variance using stored hop counts to distinguish attackers from legitimate users. We use the NDN simulator ndnSIM to evaluate FROG's effectiveness. Our results show that FROG improves resilience against DDoS attacks. In particular, during an attack, legitimate users can still receive 75% of requested contents. Without FROG this number decreases to 50%.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofseries2018 IEEE Symposium on Computers and Communications (ISCC);Pages 00492-00497-
dc.subjectFROGen_US
dc.subjectPacket Hop Counten_US
dc.subjectCount based DDoSen_US
dc.subjectCountermeasureen_US
dc.titleFROG: A packet hop count based DDoS countermeasure in NDNen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ISCC.2018.8538468en_US
Appears in Collections:Research Papers - Dept of Computer Systems Engineering
Research Papers - IEEE
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
FROG_A_Packet_Hop_Count_based_DDoS_Countermeasure_in_NDN.pdf
  Until 2050-12-31
1.45 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.