Title :
Exploiting information centric networking to build an attacker-controlled content delivery network
Author :
Mauri, Giulia ; Raspadori, Riccardo ; Gerlay, Mario ; Verticale, Giacomo
Author_Institution :
Dept. of Electron., Inf. & Bioeng., Politec. di Milano, Milan, Italy
Abstract :
The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor´s home router, with significant performance improvement. This paper shows how an attacker using compromised hosts can easily gather a massive amount of low-cost, low-latency storage for malware, junk, and other attacker-controlled content. We conclude by considering a possible countermeasure, a blacklist fed by a honeypot, which we show to be effective.
Keywords :
cache storage; invasive software; storage management; ICN model; attacker-controlled content delivery network; caching; compromised hosts; honeypot; information centric networking; low-cost storage; low-latency storage; malware; routers; Bandwidth; Degradation; Monitoring; Peer-to-peer computing; Pollution; Routing; Standards; Cache Pollution; False Locality; Honeypot; Information Centric Networking; Named Data Networking; ndnSIM;
Conference_Titel :
Ad Hoc Networking Workshop (MED-HOC-NET), 2015 14th Annual Mediterranean
Conference_Location :
Vilamoura
DOI :
10.1109/MedHocNet.2015.7173159