DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wählisch, Matthias | - |
dc.contributor.author | Schmidt, Thomas C. | - |
dc.contributor.author | Vahlenkamp, Markus | - |
dc.date.accessioned | 2020-08-26T09:16:26Z | - |
dc.date.available | 2020-08-26T09:16:26Z | - |
dc.date.issued | 2013-11-13 | - |
dc.identifier.issn | 1872-7069 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/1184 | - |
dc.description.abstract | Information-centric networking (ICN) raises data objects to first class routable entities in the network and changes the Internet paradigm from host-centric connectivity to data-oriented delivery. However, current approaches to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, threats to the stability and security of the content distribution system are analyzed in theory, simulations, and practical experiments. We derive relations between state resources and the performance of routers, and demonstrate how this coupling can be misused in practice. We further show how state-based forwarding tends to degrade by decorrelating resources. We identify intrinsic attack vectors present in current content-centric routing, as well as possibilities and limitations to mitigate them. Our overall findings suggest that major architectural refinements are required prior to global ICN deployment in the real world. | en |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.relation.ispartof | Computer networks : the international journal of computer and telecommunications networking | en_US |
dc.subject | Security | en_US |
dc.subject | Vulnerability | en_US |
dc.subject | Performance evaluation | en_US |
dc.subject | Interest flooding | en_US |
dc.subject | Content-centric routing | en_US |
dc.subject | Denial of service (DoS) | en_US |
dc.subject.ddc | 004: Informatik | en_US |
dc.title | Backscatter from the data plane : threats to stability and security in information-centric network infrastructure | en |
dc.type | Article | en_US |
dc.description.version | PeerReviewed | en_US |
tuhh.container.endpage | 3206 | en_US |
tuhh.container.issue | 16 | en_US |
tuhh.container.startpage | 3192 | en_US |
tuhh.container.volume | 57 | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Informatik | en_US |
tuhh.publication.institute | Fakultät Technik und Informatik | en_US |
tuhh.publisher.doi | 10.1016/j.comnet.2013.07.009 | - |
tuhh.publisher.doi | 10.48550/arXiv.1205.4778 | - |
tuhh.type.opus | (wissenschaftlicher) Artikel | - |
dc.type.casrai | Journal Article | - |
dc.type.dini | article | - |
dc.type.driver | article | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
local.comment.external | Preprint: https://doi.org/10.48550/arXiv.1205.4778. Verlagsversion: https://doi.org/10.1016/j.comnet.2013.07.009. | en_US |
item.creatorGND | Wählisch, Matthias | - |
item.creatorGND | Schmidt, Thomas C. | - |
item.creatorGND | Vahlenkamp, Markus | - |
item.fulltext | No Fulltext | - |
item.creatorOrcid | Wählisch, Matthias | - |
item.creatorOrcid | Schmidt, Thomas C. | - |
item.creatorOrcid | Vahlenkamp, Markus | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.openairetype | Article | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.orcid | 0000-0002-0956-7885 | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
Appears in Collections: | Publications without full text |
Add Files to Item
Note about this record
Export
Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.