Interest Flooding Attack
An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking (NDN)). An attacker requests existing or non-existing content in order to overload the distribution infrastructure.[1] This can be implemented by sending Interest packets, which are not resolved at all or not resolved fast enough, and thus lead to malicious CPU or memory consumption.[citation needed]
This attack was previously denoted an open problem in ICN, only heuristic countermeasures available.[vague][2] In 2016, Aubrey Alston and Tamer Refaei of The MITRE Corporation presented an exact solution to this problem which utilizes an in-packet cryptographic mechanism to remove the ability of high-volume Interest traffic to overload the distribution infrastructure of the network.[3]
References
[edit]- ^ Wählisch, Matthias; Schmidt, Thomas C.; Vahlenkamp, Markus (November 2013). "Backscatter from the data plane – Threats to stability and security in information-centric network infrastructure". Computer Networks. 57 (16): 3192–3206. arXiv:1205.4778. doi:10.1016/j.comnet.2013.07.009.
 - ^ Afanasyev, Alexander; Mahadevan, Priya; Moiseenko, Ilya; Uzun, Ersin; Zhang, Lixia (2013). "Interest Flooding Attack and Countermeasures in Named Data Networking" (PDF). Proceedings of IFIP Networking.
 - ^ Alston, Aubrey; Refaei, Tamer (2016). "Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens". 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). pp. 85–88. doi:10.1109/NCA.2016.7778598. ISBN 978-1-5090-3216-7.