DC Field | Value | Language |
---|---|---|
dc.contributor.author | Al-Sheikh, Samir | - |
dc.contributor.author | Wählisch, Matthias | - |
dc.contributor.author | Schmidt, Thomas C. | - |
dc.date.accessioned | 2020-08-26T09:12:39Z | - |
dc.date.available | 2020-08-26T09:12:39Z | - |
dc.date.issued | 2015 | - |
dc.identifier.isbn | 978-1-4503-4098-4 | en_US |
dc.identifier.isbn | 978-1-4503-3855-4 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/472 | - |
dc.description.abstract | Interest flooding has been identified as a major threat for the NDN infrastructure. Since then several approaches have been proposed to identify and to mitigate this attack. In this paper, we (a) classify nine existing countermeasures and (b) compare them in a consistent evaluation setup. We discuss the application of pure prefix-based as well as pure interfacebased mitigation strategies in different network scenarios. | en |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.ispartofseries | Proceedings of the 2nd ACM Conference on Information-Centric Networking | |
dc.subject | ICN | en_US |
dc.subject | NDN | en_US |
dc.subject | Interest flooding | en_US |
dc.subject | attack | en_US |
dc.subject | mitigation | en_US |
dc.subject.ddc | 004: Informatik | en_US |
dc.title | Revisiting Countermeasures Against NDN Interest Flooding | en |
dc.type | inProceedings | en_US |
dc.relation.conference | International Conference on Informatic-Centric Networking 2015 | en_US |
dc.description.version | Unknown | en_US |
tuhh.container.endpage | 196 | en_US |
tuhh.container.startpage | 195 | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Informatik | en_US |
tuhh.publication.institute | Fakultät Technik und Informatik | en_US |
tuhh.publisher.doi | 10.1145/2810156.2812604 | - |
tuhh.relation.ispartofseries | ICN'15 : proceedings of the 2nd International Conference on Information-Centric Networking : September 30-October 2, 2015, San Francisco, CA, USA | en_US |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.casrai | Conference Paper | - |
dc.type.dini | contributionToPeriodical | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
item.creatorGND | Al-Sheikh, Samir | - |
item.creatorGND | Wählisch, Matthias | - |
item.creatorGND | Schmidt, Thomas C. | - |
item.fulltext | No Fulltext | - |
item.creatorOrcid | Al-Sheikh, Samir | - |
item.creatorOrcid | Wählisch, Matthias | - |
item.creatorOrcid | Schmidt, Thomas C. | - |
item.seriesref | ICN'15 : proceedings of the 2nd International Conference on Information-Centric Networking : September 30-October 2, 2015, San Francisco, CA, USA | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.tuhhseriesid | ICN'15 : proceedings of the 2nd International Conference on Information-Centric Networking : September 30-October 2, 2015, San Francisco, CA, USA | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.openairetype | inProceedings | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.orcid | 0000-0002-0956-7885 | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
Appears in Collections: | Publications without full text |
Add Files to Item
Note about this record
Export
Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.