TY - JOUR
T1 - Interest Flooding Attacks in Named Data Networking
T2 - Survey of Existing Solutions, Open Issues, Requirements, and Future Directions
AU - Benmoussa, Ahmed
AU - Kerrache, Chaker Abdelaziz
AU - Lagraa, Nasreddine
AU - Mastorakis, Spyridon
AU - Lakas, Abderrahmane
AU - Tahari, Abdou El Karim
N1 - Publisher Copyright:
© 2022 Association for Computing Machinery.
PY - 2023/7/31
Y1 - 2023/7/31
N2 - Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a new architecture come new threats, and NDN is no exception. NDN is a potential target for new network attacks such as Interest Flooding Attacks (IFAs). Attackers take advantage of IFA to launch (D)DoS attacks in NDN. Many IFA detection and mitigation solutions have been proposed in the literature. However, there is no comprehensive review study of these solutions that has been proposed so far. Therefore, in this article, we propose a survey of the various IFAs with a detailed comparative study of all the relevant proposed solutions as counter-measures against IFAs. We also review the requirements for a complete and efficient IFA solution and pinpoint the various issues encountered by IFA detection and mitigation mechanisms through a series of attack scenarios. Finally, in this survey, we offer an analysis of the open issues and future research directions regarding IFAs.
AB - Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a new architecture come new threats, and NDN is no exception. NDN is a potential target for new network attacks such as Interest Flooding Attacks (IFAs). Attackers take advantage of IFA to launch (D)DoS attacks in NDN. Many IFA detection and mitigation solutions have been proposed in the literature. However, there is no comprehensive review study of these solutions that has been proposed so far. Therefore, in this article, we propose a survey of the various IFAs with a detailed comparative study of all the relevant proposed solutions as counter-measures against IFAs. We also review the requirements for a complete and efficient IFA solution and pinpoint the various issues encountered by IFA detection and mitigation mechanisms through a series of attack scenarios. Finally, in this survey, we offer an analysis of the open issues and future research directions regarding IFAs.
KW - Interest Flooding Attack (IFA)
KW - Named Data Networking (NDN)
KW - survey
UR - http://www.scopus.com/inward/record.url?scp=85142900457&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85142900457&partnerID=8YFLogxK
U2 - 10.1145/3539730
DO - 10.1145/3539730
M3 - Article
AN - SCOPUS:85142900457
SN - 0360-0300
VL - 55
JO - ACM Computing Surveys
JF - ACM Computing Surveys
IS - 7
M1 - 3539730
ER -