ICN 해킹 공격 및 대응 방안 연구 동향

  • Published : 2016.12.31

Abstract

ICN은 증가하는 콘텐츠 트래픽을 효율적으로 수용하려는 목적으로 새롭게 제안된 미래 인터넷 기술이다. 기존 host-centric 구조와 다르게 콘텐츠의 경로의 보안성 보다는 콘텐츠 자체의 안전성을 고려한 것이 큰 특징이다. 본 논문에서는 ICN의 naming, routing, caching 및 그 외 특성들을 살펴보고 그와 관련된 공격 유형 및 현재까지 제안된 대응 방안에 대해 살펴본다.

Keywords

References

  1. Cisco Visual Networking Index: Forecst and Methodology, 2015-2020, white paper
  2. A. M. K. Pathan and B. Rajkumar, "A taxonomy and survey of content delivery networks," Grid Comput. Distrib. Syst. Lab., Univ. Melbourne, Parkville, Vic, Australia, Tech. Rep., 2007.
  3. E. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, "A survey and comparison of peer-to-peer overlay network schemes," IEEE Commun. Surveys Tuts., vol. 7, no. 2, pp. 72-93, 2005. https://doi.org/10.1109/COMST.2005.1610546
  4. S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker, "On preserving privacy in content-oriented networks," in Proc. ACM SIGCOMM Workshop CN, Aug. 2011, pp. 19-24.
  5. M. Ion, J. Zhang, M. Schuchard, and E. M. Schooler, "Toward contentcentric privacy in ICN: Attribute-based encryption and routing," in Proc. ASIA CCS, Hangzhou, China, Aug. 2013, pp. 513-514.
  6. G. Tyson, N. Sastry, I. Rimac, R. Cuevas, and A. Mauthe, "A survey of mobility in information-centric networks: Challenges and research directions," in Proc. NoM, New York, NY, USA, Jun. 2012, pp. 1-6.
  7. P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, "DoS & DDoS in named data networking," in Proc 22nd Int. Conf. Comput. Commun. Netw., 2013,pp.1-7.
  8. A. Compagno, M. Conti, P. Gasti, and G. Tsudik, "Poseidon: Mitigating interest flooding DDoS attacks in named data networking," in Proc. IEEE 38th Conf. Local Comput. Netw., Oct. 2013, pp. 630-638.
  9. N. Fotiou, G. F. Giannis, and G. C. Polyzos, "Access control enforcement delegation for information-centric networking architectures," in Proc. 2nd Edition ICN Workshop Inf.-Centric Netw., Aug. 2012, pp. 85-90.
  10. N. Fotiou, G. F. Marias, and G. C. Polyzos, "Fighting spam in publish /subscribe networks using information ranking," in Proc. 6thEURO-NF Conf. NGI, Paris, France, Jun. 2010, pp.1-6.
  11. M. Xie, I.Widjaja, andH.Wang, "Enhancing cache robustness for contentcentric networking," in Proc. IEEE INFOCOM, 2012, pp. 2426-2434.
  12. A. Mohaisen, X. Zhang, M. Schuchard, H. Xie, and Y. Kim, "Protecting access privacy of cached contents in information centric networks," in Proc. SIGCOMM, Hong Kong, China, May 2013, pp. 1001-1003.
  13. C. Ghali, G. Tsudik, and E. Uzun, "Needle in a haystack: Mitigating content poisoning in named-data networking," in Proc. SENT, San Diego, CA, USA, 2014, pp. 1-10.
  14. B. Vieira and E. Poll, "A security protocol for information-centric net- working in smart grids," in Proc. SEGS, Berlin, Germany, Nov. 2013, pp. 1-10.
  15. A. Barua, H. Shahriar, and M. Zulkernine, "Server-side detection of content sniffing attacks," in Proc. 22nd Annu. ISSRE, Hiroshima, Japan, Nov. 2011, pp. 20-29.
  16. H. Shahriar and M. Zulkernine, "Client-side detection of cross-site request forgery attacks," in Proc. 21st IEEE ISSRE, San Jose, CA, USA, Nov. 2010, pp. 358-367.
  17. E. AfAllah, H.Hassanein and M.Zulkernine."A Survey of Security Attacks in Information-Centric Networking", in IEEE Comm. Survey & Tutorials, Jan. 2015, pp 1441-1454