Name anomaly detection for ICN

Daishi Kondo, Thomas Silverston, Hideki Tode, Tohru Asami, Olivier Perrin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Information leakages are one of the main security threats in today's Internet. As ICN is expected to become the core architecture for Future Internet, it is therefore mandatory to prevent this threat. This paper proves that some ICN configuration prevents information leakages via Data packets and shows that it is an open problem to prevent interest packets from carrying encoded crucial information in their names. Assuming that names in ICN will follow the current URL format commonly used in the Internet, we get the statistics of web URL based on extensive crawling experiments of main internet organizations. Then we propose a simple filtering technique based on these statistics for firewall to detect anomalous names in ICN. The experiment shows that our filtering technique recognizes 15% of names in our dataset as malicious. As the false positive rate is still high for this filter to be used in a real world operation, this work is an important step for detecting anomalous names and preventing information-leakage in ICN.

Original languageEnglish
Title of host publicationIEEE LANMAN 2016 - 22nd IEEE International Symposium on Local and Metropolitan Area Networks
PublisherIEEE Computer Society
ISBN (Electronic)9781467398824
DOIs
Publication statusPublished - 2016 Aug 22
Externally publishedYes
Event22nd IEEE International Symposium on Local and Metropolitan Area Networks, IEEE LANMAN 2016 - Rome, Italy
Duration: 2016 Jun 132016 Jun 15

Publication series

NameIEEE Workshop on Local and Metropolitan Area Networks
Volume2016-August
ISSN (Print)1944-0367
ISSN (Electronic)1944-0375

Other

Other22nd IEEE International Symposium on Local and Metropolitan Area Networks, IEEE LANMAN 2016
Country/TerritoryItaly
CityRome
Period16/6/1316/6/15

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Name anomaly detection for ICN'. Together they form a unique fingerprint.

Cite this