DC ElementWertSprache
dc.contributor.authorWählisch, Matthias-
dc.contributor.authorSchmidt, Thomas C.-
dc.contributor.authorVahlenkamp, Markus-
dc.date.accessioned2020-08-26T09:16:26Z-
dc.date.available2020-08-26T09:16:26Z-
dc.date.issued2013-11-13-
dc.identifier.issn1872-7069en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/1184-
dc.description.abstractInformation-centric networking (ICN) raises data objects to first class routable entities in the network and changes the Internet paradigm from host-centric connectivity to data-oriented delivery. However, current approaches to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, threats to the stability and security of the content distribution system are analyzed in theory, simulations, and practical experiments. We derive relations between state resources and the performance of routers, and demonstrate how this coupling can be misused in practice. We further show how state-based forwarding tends to degrade by decorrelating resources. We identify intrinsic attack vectors present in current content-centric routing, as well as possibilities and limitations to mitigate them. Our overall findings suggest that major architectural refinements are required prior to global ICN deployment in the real world.en
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.relation.ispartofComputer networks : the international journal of computer and telecommunications networkingen_US
dc.subjectSecurityen_US
dc.subjectVulnerabilityen_US
dc.subjectPerformance evaluationen_US
dc.subjectInterest floodingen_US
dc.subjectContent-centric routingen_US
dc.subjectDenial of service (DoS)en_US
dc.subject.ddc004: Informatiken_US
dc.titleBackscatter from the data plane : threats to stability and security in information-centric network infrastructureen
dc.typeArticleen_US
dc.description.versionPeerRevieweden_US
tuhh.container.endpage3206en_US
tuhh.container.issue16en_US
tuhh.container.startpage3192en_US
tuhh.container.volume57en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.doi10.1016/j.comnet.2013.07.009-
tuhh.publisher.doi10.48550/arXiv.1205.4778-
tuhh.type.opus(wissenschaftlicher) Artikel-
dc.type.casraiJournal Article-
dc.type.diniarticle-
dc.type.driverarticle-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
local.comment.externalPreprint: https://doi.org/10.48550/arXiv.1205.4778. Verlagsversion: https://doi.org/10.1016/j.comnet.2013.07.009.en_US
item.creatorGNDWählisch, Matthias-
item.creatorGNDSchmidt, Thomas C.-
item.creatorGNDVahlenkamp, Markus-
item.fulltextNo Fulltext-
item.creatorOrcidWählisch, Matthias-
item.creatorOrcidSchmidt, Thomas C.-
item.creatorOrcidVahlenkamp, Markus-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_6501-
item.openairetypeArticle-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

87
checked on 27.12.2024

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.