Detection of cache pollution attacks using randomness checks

Hyundo Park, Indra Widjaja, Heejo Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)

    Abstract

    The Internet plays an increasing role in content dissemination as user-generated contents have exploded recently. Cache servers have been deployed to bypass bottlenecks in the network so that contents can be delivered to end users more efficiently. With caches becoming more embedded in the networks, emerging threats follow naturally. A cache pollution attack is one of the most serious threats on caching networks including the current Internet and emerging caching networks such as Content Centric Networking (CCN). In this paper, we propose a detection approach against cache pollution attacks using randomness checks of a matrix. We apply an effective filtering approach and a statistical sequential analysis for detecting low-rate attacks. The results of our experiments show that our approach can detect a cache pollution attack with attack rate of only a few percent of the overall rate.

    Original languageEnglish
    Title of host publication2012 IEEE International Conference on Communications, ICC 2012
    Pages1096-1100
    Number of pages5
    DOIs
    Publication statusPublished - 2012
    Event2012 IEEE International Conference on Communications, ICC 2012 - Ottawa, ON, Canada
    Duration: 2012 Jun 102012 Jun 15

    Publication series

    NameIEEE International Conference on Communications
    ISSN (Print)1550-3607

    Other

    Other2012 IEEE International Conference on Communications, ICC 2012
    Country/TerritoryCanada
    CityOttawa, ON
    Period12/6/1012/6/15

    Keywords

    • cache pollution attack
    • caching network
    • matrix operation
    • randomness checks

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Detection of cache pollution attacks using randomness checks'. Together they form a unique fingerprint.

    Cite this