DC Element | Wert | Sprache |
---|---|---|
dc.contributor.author | Wählisch, Matthias | - |
dc.contributor.author | Schmidt, Thomas C. | - |
dc.contributor.author | Vahlenkamp, Markus | - |
dc.date.accessioned | 2020-08-26T09:16:26Z | - |
dc.date.available | 2020-08-26T09:16:26Z | - |
dc.date.issued | 2013-11-13 | - |
dc.identifier.issn | 1872-7069 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/1184 | - |
dc.description.abstract | Information-centric networking (ICN) raises data objects to first class routable entities in the network and changes the Internet paradigm from host-centric connectivity to data-oriented delivery. However, current approaches to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, threats to the stability and security of the content distribution system are analyzed in theory, simulations, and practical experiments. We derive relations between state resources and the performance of routers, and demonstrate how this coupling can be misused in practice. We further show how state-based forwarding tends to degrade by decorrelating resources. We identify intrinsic attack vectors present in current content-centric routing, as well as possibilities and limitations to mitigate them. Our overall findings suggest that major architectural refinements are required prior to global ICN deployment in the real world. | en |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.relation.ispartof | Computer networks : the international journal of computer and telecommunications networking | en_US |
dc.subject | Security | en_US |
dc.subject | Vulnerability | en_US |
dc.subject | Performance evaluation | en_US |
dc.subject | Interest flooding | en_US |
dc.subject | Content-centric routing | en_US |
dc.subject | Denial of service (DoS) | en_US |
dc.subject.ddc | 004: Informatik | en_US |
dc.title | Backscatter from the data plane : threats to stability and security in information-centric network infrastructure | en |
dc.type | Article | en_US |
dc.description.version | PeerReviewed | en_US |
tuhh.container.endpage | 3206 | en_US |
tuhh.container.issue | 16 | en_US |
tuhh.container.startpage | 3192 | en_US |
tuhh.container.volume | 57 | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Informatik | en_US |
tuhh.publication.institute | Fakultät Technik und Informatik | en_US |
tuhh.publisher.doi | 10.1016/j.comnet.2013.07.009 | - |
tuhh.publisher.doi | 10.48550/arXiv.1205.4778 | - |
tuhh.type.opus | (wissenschaftlicher) Artikel | - |
dc.type.casrai | Journal Article | - |
dc.type.dini | article | - |
dc.type.driver | article | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
local.comment.external | Preprint: https://doi.org/10.48550/arXiv.1205.4778. Verlagsversion: https://doi.org/10.1016/j.comnet.2013.07.009. | en_US |
item.creatorGND | Wählisch, Matthias | - |
item.creatorGND | Schmidt, Thomas C. | - |
item.creatorGND | Vahlenkamp, Markus | - |
item.fulltext | No Fulltext | - |
item.creatorOrcid | Wählisch, Matthias | - |
item.creatorOrcid | Schmidt, Thomas C. | - |
item.creatorOrcid | Vahlenkamp, Markus | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.openairetype | Article | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.orcid | 0000-0002-0956-7885 | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
Enthalten in den Sammlungen: | Publications without full text |
Volltext ergänzen
Feedback zu diesem Datensatz
Export
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.