As a promising next-generation network architecture, named data networking (NDN) supports name-based routing and in-network caching to retrieve content in an efficient, fast, and reliable manner. Most of the studies on NDN have proposed innovative and efficient caching mechanisms and retrieval of content via efficient routing. However, very few studies have targeted addressing the vulnerabilities in NDN architecture, which a malicious node can exploit to perform a content poisoning attack (CPA). This potentially results in polluting the in-network caches, the routing of content, and consequently isolates the legitimate content in the network. In the past, several efforts have been made to propose the mitigation strategies for the content poisoning attack, but to the best of our knowledge, no specific work has been done to address an emerging attack-surface in NDN, which we call an interest flooding attack. Handling this attack-surface can potentially make content poisoning attack mitigation schemes more effective, secure, and robust. Hence, in this article, we propose the addition of a security mechanism in the CPA mitigation scheme that is, Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe, in which we block the malicious face of compromised consumers by monitoring the Cache-Miss Ratio values and the Queue Capacity at the Edge Routers. The malicious face is blocked when the cache-miss ratio hits the threshold value, which is adjusted dynamically through monitoring the cache-miss ratio and queue capacity values. The experimental results show that we are successful in mitigating the vulnerability of the CPA mitigation scheme by detecting and blocking the flooding interface, at the cost of very little verification overhead at the NDN Routers.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8022593PMC
http://dx.doi.org/10.7717/peerj-cs.435DOI Listing

Publication Analysis

Top Keywords

content poisoning
12
poisoning attack
12
cache-miss ratio
12
content efficient
8
cpa mitigation
8
mitigation scheme
8
malicious face
8
monitoring cache-miss
8
queue capacity
8
content
7

Similar Publications

Concoctive principles of detoxification and retention of the main toxic hepatotoxicity of Tripterygium wilfordii and its anti-inflammatory efficacy by concocting with the medicinal excipient Spatholobi Caulis juice.

Fitoterapia

January 2025

College of Pharmacy, Henan University of Chinese Medicine, Zhengzhou 450046, China; Co-Construction Collaborative Innovation Center for Chinese Medicine and Respiratory Diseases by Henan & Education Ministry of P.R. China, Henan University of Chinese Medicine, Zhengzhou 450046, China; Collaborative Innovation Center of Research and Development on the Whole Industry Chain of Yu-Medicine, Zhengzhou 450046, China. Electronic address:

Tripterygium wilfordii (TW), which has severe hepatotoxicity, is commonly used as anti-rheumatism. Using the juice of auxiliary herbs in concocting poisonous herbs is a conventional method for toxicity reduction or efficacy enhancement. Traditional Chinese Pharmacy textbooks record that Spatholobi Caulis (SC) can alleviate the side effects caused by TW and also possesses excellent hepatoprotective effect.

View Article and Find Full Text PDF

Extracellular vesicles (EVs) are nanoparticle-sized vesicles secreted by nearly all cell types under normal physiological conditions. In toxicological research, EVs have emerged as a crucial link between public health and multi-omics approaches, offering insights into cellular responses to disease-causing injury agents such as environmental and biological toxins, contaminants, and drugs. Notably, EVs present a unique opportunity to deepen our understanding of the pathophysiology of envenomation by natural toxins.

View Article and Find Full Text PDF

fungi are widespread pathogens of food crops, primarily associated with the formation of mycotoxins. Therefore, effective mitigation strategies for these toxicogenic microorganisms are required. In this study, the potential of pulsed electric field (PEF) as an advanced technology of increasing use in the food processing industry was investigated to minimize the viability of pathogens and to characterize the PEF-induced changes at the metabolomic level.

View Article and Find Full Text PDF

Introduction: The COVID-19 pandemic accelerated new vaccine development. Limited safety data necessitated robust global safety surveillance to accurately identify and promptly communicate potential safety issues. The African Union Smart Safety Surveillance (AU-3S) program established the Joint Signal Management (JSM) group to support identification of potential vaccine safety concerns in five pilot countries (Ethiopia, Ghana, Kenya, Nigeria, South Africa), accounting for approximately 35% of the African population.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!