Threat identification and risk assessments for named data networking architecture using SecRam

Author:

Singh Vishwa Pratap,Ujjwal R.L.

Abstract

Named Data networking is an instance of information centric networking, aims to improve the performance of the Internet by using in-network caching at storage-enabled routers and provide name based content access. However, name based content access and in-network caching make Name Data network vulnerable to new security attacks like cache pollutions, cache poisoning, false locality, cache snooping and interest flooding, etc. In this paper, we have evaluated NDN security principles, the impact of threats, ratified various security enablers, and built-in mitigation actions to combat security attacks. We have systematically applied SecRam in NDN for statistical security risk assessment, identification of run time threats, and assessment of available methods to mitigate these threats, as SecRam considers operational focus areas and proved useful for identification and severity assessment of run time threats. We have modified SecRam and used it in an entirely different domain, i.e., to a computer network, as SESAR proposed SecRam specifically for ATM systems that cannot be directly applied to another context. According to the best of our knowledge, it is the first attempt for a complete risk assessment of NDN. We have concluded this paper by defining a set of open security challenges that should be considered by future researchers.

Publisher

IOS Press

Subject

Artificial Intelligence,Control and Systems Engineering,Software

Reference57 articles.

1. Named data networking (ndn) project;Zhang;Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC,2010

2. SecRAM implementation guidance material;SESAR;Project Deliverable

3. Y. Liu, Z. Wang and N. Liu, A case study of detecting and characterizing large-scale prefix hijackings in the internet, in: Proceedings of the 2017 VI International Conference on Network, Communication and Computing, (2017).

4. Privacy attack modeling and risk assessment method for name data networking;Singh;Springer,2019

5. Introduction to multiple attribute decision-making (MADM) methods;Rao;Decision Making in the Manufacturing Environment: Using Graph Theory and Fuzzy Multiple Attribute Decision Making Methods,2007

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Modeling and Conducting Security Risk Assessment of Smart Airport Infrastructures with SecRAM;Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security;2024-04-18

2. Flight web searches analytics through big data;International Journal of Computer Applications in Technology;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3