An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking (NDN)). An attacker requests existing or non-existing content in order to overload the distribution infrastructure.[1] This can be implemented by sending Interest packets, which are not resolved at all or not resolved fast enough, and thus lead to malicious CPU or memory consumption.[2]
This attack was previously denoted an open problem in ICN, only heuristic countermeasures available.[3] In 2016, Aubrey Alston and Tamer Refaei of The MITRE Corporation presented an exact solution to this problem which utilizes an in-packet cryptographic mechanism to remove the ability of high-volume Interest traffic to overload the distribution infrastructure of the network.[4]
References
- ↑ Wählisch, Matthias; Schmidt, Thomas C.; Vahlenkamp, Markus (2013). "Backscatter from the Data Plane -- Threats to Stability and Security in Information-Centric Network Infrastructure" (PDF). Computer Networks. Original version arXiv:1205.4778v1, May 2012. 57 (16): 3192–3206. arXiv:1205.4778. doi:10.1016/j.comnet.2013.07.009. S2CID 5767511.
{{cite journal}}
: CS1 maint: location (link) - ↑ "Volatile Memory - an overview | ScienceDirect Topics". www.sciencedirect.com. Retrieved 2023-12-11.
- ↑ Afanasyev, Alexander; Mahadevan, Priya; Moiseenko, Ilya; Uzun, Ersin; Zhang, Lixia (2013). "Interest Flooding Attack and Countermeasures in Named Data Networking" (PDF). Proceedings of IFIP Networking.
- ↑ Alston, Aubrey; Refaei, Tamer (2016). "Neutralizing Interest Flooding Attacks in Named Data Networks using Cryptographic Route Tokens". Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). IEEE 15th International Symposium on Network Computing and Applications (NCA). Cambridge, MA: IEEE. pp. 85–88. doi:10.1109/NCA.2016.7778598.