DocumentCode
3368883
Title
Exploiting information centric networking to build an attacker-controlled content delivery network
Author
Mauri, Giulia ; Raspadori, Riccardo ; Gerlay, Mario ; Verticale, Giacomo
Author_Institution
Dept. of Electron., Inf. & Bioeng., Politec. di Milano, Milan, Italy
fYear
2015
fDate
17-18 June 2015
Firstpage
1
Lastpage
6
Abstract
The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor´s home router, with significant performance improvement. This paper shows how an attacker using compromised hosts can easily gather a massive amount of low-cost, low-latency storage for malware, junk, and other attacker-controlled content. We conclude by considering a possible countermeasure, a blacklist fed by a honeypot, which we show to be effective.
Keywords
cache storage; invasive software; storage management; ICN model; attacker-controlled content delivery network; caching; compromised hosts; honeypot; information centric networking; low-cost storage; low-latency storage; malware; routers; Bandwidth; Degradation; Monitoring; Peer-to-peer computing; Pollution; Routing; Standards; Cache Pollution; False Locality; Honeypot; Information Centric Networking; Named Data Networking; ndnSIM;
fLanguage
English
Publisher
ieee
Conference_Titel
Ad Hoc Networking Workshop (MED-HOC-NET), 2015 14th Annual Mediterranean
Conference_Location
Vilamoura
Type
conf
DOI
10.1109/MedHocNet.2015.7173159
Filename
7173159
Link To Document