• DocumentCode
    3368883
  • Title

    Exploiting information centric networking to build an attacker-controlled content delivery network

  • Author

    Mauri, Giulia ; Raspadori, Riccardo ; Gerlay, Mario ; Verticale, Giacomo

  • Author_Institution
    Dept. of Electron., Inf. & Bioeng., Politec. di Milano, Milan, Italy
  • fYear
    2015
  • fDate
    17-18 June 2015
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor´s home router, with significant performance improvement. This paper shows how an attacker using compromised hosts can easily gather a massive amount of low-cost, low-latency storage for malware, junk, and other attacker-controlled content. We conclude by considering a possible countermeasure, a blacklist fed by a honeypot, which we show to be effective.
  • Keywords
    cache storage; invasive software; storage management; ICN model; attacker-controlled content delivery network; caching; compromised hosts; honeypot; information centric networking; low-cost storage; low-latency storage; malware; routers; Bandwidth; Degradation; Monitoring; Peer-to-peer computing; Pollution; Routing; Standards; Cache Pollution; False Locality; Honeypot; Information Centric Networking; Named Data Networking; ndnSIM;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Ad Hoc Networking Workshop (MED-HOC-NET), 2015 14th Annual Mediterranean
  • Conference_Location
    Vilamoura
  • Type

    conf

  • DOI
    10.1109/MedHocNet.2015.7173159
  • Filename
    7173159