Interest Flooding Attack

Last updated

An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking (NDN)). An attacker requests existing or non-existing content in order to overload the distribution infrastructure. [1] This can be implemented by sending Interest packets, which are not resolved at all or not resolved fast enough, and thus lead to malicious CPU or memory consumption.[ citation needed ]

This attack was previously denoted an open problem in ICN, only heuristic countermeasures available.[ vague ] [2] In 2016, Aubrey Alston and Tamer Refaei of The MITRE Corporation presented an exact solution to this problem which utilizes an in-packet cryptographic mechanism to remove the ability of high-volume Interest traffic to overload the distribution infrastructure of the network. [3]

References

  1. Wählisch, Matthias; Schmidt, Thomas C.; Vahlenkamp, Markus (November 2013). "Backscatter from the data plane – Threats to stability and security in information-centric network infrastructure". Computer Networks. 57 (16): 3192–3206. arXiv: 1205.4778 . doi:10.1016/j.comnet.2013.07.009.
  2. Afanasyev, Alexander; Mahadevan, Priya; Moiseenko, Ilya; Uzun, Ersin; Zhang, Lixia (2013). "Interest Flooding Attack and Countermeasures in Named Data Networking" (PDF). Proceedings of IFIP Networking.
  3. Alston, Aubrey; Refaei, Tamer (2016). "Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens". 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). pp. 85–88. doi:10.1109/NCA.2016.7778598. ISBN   978-1-5090-3216-7.