DC Element | Wert | Sprache |
---|---|---|
dc.contributor.author | Al-Sheikh, Samir | - |
dc.contributor.author | Wählisch, Matthias | - |
dc.contributor.author | Schmidt, Thomas C. | - |
dc.date.accessioned | 2020-08-26T09:12:39Z | - |
dc.date.available | 2020-08-26T09:12:39Z | - |
dc.date.issued | 2015 | - |
dc.identifier.isbn | 978-1-4503-4098-4 | en_US |
dc.identifier.isbn | 978-1-4503-3855-4 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/472 | - |
dc.description.abstract | Interest flooding has been identified as a major threat for the NDN infrastructure. Since then several approaches have been proposed to identify and to mitigate this attack. In this paper, we (a) classify nine existing countermeasures and (b) compare them in a consistent evaluation setup. We discuss the application of pure prefix-based as well as pure interfacebased mitigation strategies in different network scenarios. | en |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.ispartofseries | Proceedings of the 2nd ACM Conference on Information-Centric Networking | |
dc.subject | ICN | en_US |
dc.subject | NDN | en_US |
dc.subject | Interest flooding | en_US |
dc.subject | attack | en_US |
dc.subject | mitigation | en_US |
dc.subject.ddc | 004: Informatik | en_US |
dc.title | Revisiting Countermeasures Against NDN Interest Flooding | en |
dc.type | inProceedings | en_US |
dc.relation.conference | International Conference on Informatic-Centric Networking 2015 | en_US |
dc.description.version | Unknown | en_US |
tuhh.container.endpage | 196 | en_US |
tuhh.container.startpage | 195 | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Informatik | en_US |
tuhh.publication.institute | Fakultät Technik und Informatik | en_US |
tuhh.publisher.doi | 10.1145/2810156.2812604 | - |
tuhh.relation.ispartofseries | ICN'15 : proceedings of the 2nd International Conference on Information-Centric Networking : September 30-October 2, 2015, San Francisco, CA, USA | en_US |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.casrai | Conference Paper | - |
dc.type.dini | contributionToPeriodical | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
item.creatorGND | Al-Sheikh, Samir | - |
item.creatorGND | Wählisch, Matthias | - |
item.creatorGND | Schmidt, Thomas C. | - |
item.fulltext | No Fulltext | - |
item.creatorOrcid | Al-Sheikh, Samir | - |
item.creatorOrcid | Wählisch, Matthias | - |
item.creatorOrcid | Schmidt, Thomas C. | - |
item.seriesref | ICN'15 : proceedings of the 2nd International Conference on Information-Centric Networking : September 30-October 2, 2015, San Francisco, CA, USA | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.tuhhseriesid | ICN'15 : proceedings of the 2nd International Conference on Information-Centric Networking : September 30-October 2, 2015, San Francisco, CA, USA | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.openairetype | inProceedings | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.orcid | 0000-0002-0956-7885 | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
Enthalten in den Sammlungen: | Publications without full text |
Volltext ergänzen
Feedback zu diesem Datensatz
Export
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.