References
- V. Jacobson, D.K. Semtters, J.D. Thornton, M.F. Plass, N. H. Briggs and R. L. Braynard, "Networking named content," Communications of the ACM, vol. 55, no. 1, pp. 117-124, January, 2012. https://doi.org/10.1145/2063176.2063204
- J. Kurose, "Information-Centric Networking: The Evolution from Circuits to Packets to Content," Computer Networks, vol. 66, pp. 112-120, June, 2014. https://doi.org/10.1016/j.comnet.2014.04.002
- S.T. Zargar, J. Joshi and D. Tipper, "A survey of defense mechanisms against Distributed Denial of Service (DDoS) Flooding Attacks," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069, March, 2013. https://doi.org/10.1109/SURV.2013.031413.00127
- A. Afanasyev, P. Mahadevan, E. Uzun and L. Zhang, "Interest Flooding Attack and Countermeasures in Named Data Networking," in Proc. of IFIP Networking, pp. 217-225, May 22-24, 2013.
- R. Tourani, T. Mick, S. Misra and G. Panwar, "Security, Privacy, and Access Control in Information-Centric Networking: A Survey," arXiv:1603.03409v2(submitted to IEEE Communications Surveys & Tutorials), pp. 1-35, September, 2016.
- E. G. Abdallah, H. S. Hassanein and M. Zulkernine, "A Survey of Security Attacks in Information-Centric Networking," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1441-1454, January 2015. https://doi.org/10.1109/COMST.2015.2392629
- S. Mastorakis, A. Afanasyev, I. Moiseenko and L. Zhang, "ndnSIM 2.0: A new version of the NDN simulator for NS-3," NDN, Technical Report NDN-0028, pp. 1-8, January, 2015.
- P. Gasti, G. Tsudik, E. Uzun and L. Zhang, "DoS & DDoS in Named-Data Networking," in Proc. of 22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1-7, July 30 - August 2, 2013.
- M. Wahlisch, T. C. Schmidt and M. Vahlenkamp, "Lessons from the Past: Why Data-driven States Harm Future Information-Centric Networking," in Proc. of IFIP Networking, pp. 253-261, May 22-24, 2013.
- K. Wang, J. Chen, H.C. Zhou, Y.J. Qin and H.K. Zhang, "Modeling Denial-of-Service against Pending Interest Table in Named Data Networking," International Journal of Communication Systems, vol. 27, no. 12, pp. 4355-4368, December, 2014. https://doi.org/10.1002/dac.2618
- K. Wang, H.C. Zhou, H.B. Luo, J.F. Guan, Y.J. Qin and H.K. Zhang, "Detecting and Mitigating Interest Flooding Attacks in Content-Centric Network," Security and Communication Networks, vol. 7, no. 4, pp. 685-699, April, 2014. https://doi.org/10.1002/sec.770
- H. Dai, Y. Wang, J. Fan and B. Liu, "Mitigate DDoS Attacks in NDN by Interest Traceback," in Proc. of IEEE INFOCOM NOMEN Workshop, pp. 381-386, April 14-19, 2013.
- K. Wang, H.C. Zhou, J. Chen and Y.J. Qin, "RDAI: Router-based Data Aggregates Identification Mechanism for Named Data Networking," in Proc. of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 116-121, July 3-5, 2013.
- N. Spring, R. Mahajan and D. Wetherall, "Measuring ISP topologies with rocketfuel," IEEE/ACM Transactions on Networking (TON), vol. 12, no. 1, pp. 2-16, February, 2004.
- G. Carofiglio, L. Muscariello and M. Gallo, "Bandwidth and storage sharing performance in Information Centric Networking," in Proc. of ACM SIGCOMM workshop on ICN, pp. 26-31, August 15-19, 2011.