Journal article Open Access

The named data networking flow filter: Towards improved security over information leakage attacks

DaishiKondo; Vassilis Vassiliades; Thomas Silverston; Hideki Tode; Tohru Asami


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://zenodo.org/record/3746700">
    <rdf:type rdf:resource="http://www.w3.org/ns/dcat#Dataset"/>
    <dct:type rdf:resource="http://purl.org/dc/dcmitype/Text"/>
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/3746700</dct:identifier>
    <foaf:page rdf:resource="https://zenodo.org/record/3746700"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>DaishiKondo</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>aOsaka Prefecture University, 1-1 Gakuen-cho, Naka-ku, Sakai City, Osaka 599-8531, Japan</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Vassilis Vassiliades</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>bResearch Centre on Interactive Media, Smart Systems and Emerging Technologies, Dimarcheio Lefkosias, Plateia Eleftherias, Nicosia 1500, Cyprus</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Thomas Silverston</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>cShibaura Institute of Technology, 307 Fukasaku, Minuma-ku, Saitama City, Saitama 337-8570, Japan</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Hideki Tode</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>aOsaka Prefecture University, 1-1 Gakuen-cho, Naka-ku, Sakai City, Osaka 599-8531, Japan</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Tohru Asami</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Advanced Telecommunications Research Institute International, 2-2-2 Hikaridai, Seika-cho, Soraku-gun, Kyoto 619-0288, Japan</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>The named data networking flow filter: Towards improved security over information leakage attacks</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2020</dct:issued>
    <frapo:isFundedBy rdf:resource="info:eu-repo/grantAgreement/EC/H2020/739578/"/>
    <schema:funder>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </schema:funder>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2020-05-22</dct:issued>
    <dct:language rdf:resource="http://publications.europa.eu/resource/authority/language/ENG"/>
    <owl:sameAs rdf:resource="https://zenodo.org/record/3746700"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/3746700</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <owl:sameAs rdf:resource="https://doi.org/10.1016/j.comnet.2020.107187"/>
    <dct:isPartOf rdf:resource="https://zenodo.org/communities/rise-teaming-cyprus"/>
    <owl:versionInfo>Preprint</owl:versionInfo>
    <dct:description>&lt;p&gt;Named Data Networking (NDN) has the potential to create a more secure future Internet. It is therefore crucial to investigate its vulnerabilities in order to make it safer against information leakage attacks. In NDN, malware inside an enterprise can encode condential information into Interest names and send it to the attacker. One of the countermeasures is to inspect a name in the Interest using a name lter and identify it as legitimate or anomalous. Although the name lter can dramatically decrease the information leakage throughput per Interest, it has a serious disadvantage: it does not consider a ow of Interests. This means that the malware can not only cause information leakage, but even improve the speed of the attack by aggressively producing massive ows of malicious Interests. This paper investigates such NDN ow attacks. Our contribution is twofold. First, we present a scheme that converts an HTTP ow into the corresponding NDN ow, as to date there is no publicly available dataset of the latter. Second, we propose an NDN ow lter based on support vector machines to classify the short-term activity of NDN consumers as legitimate or anomalous. In order to obtain legitimate and anomalous ows, we use a preprocessing anomaly detection step where we mark consumers based on their long-term activity. Our results clearly show that the ow lter improves the performance of the name lter by&lt;br&gt; two orders of&amp;nbsp;magnitude. Thus, we expect that our approach will drastically reduce the impact of this security attack in NDN.&lt;/p&gt;</dct:description>
    <dct:description>This work has received funding from the European Union's Horizon 2020 Research and Innovation Programme under Grant Agreement No 739578 and the Government of the Republic of Cyprus through the Directorate General for European Programmes, Coordination and Development.</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dcat:distribution>
      <dcat:Distribution>
        <dct:license rdf:resource="https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode"/>
        <dcat:accessURL rdf:resource="https://zenodo.org/record/3746700"/>
      </dcat:Distribution>
    </dcat:distribution>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL>https://doi.org/10.1016/j.comnet.2020.107187</dcat:accessURL>
        <dcat:byteSize>1350667</dcat:byteSize>
        <dcat:downloadURL>https://zenodo.org/record/3746700/files/Kondo_et_al_CN2020.pdf</dcat:downloadURL>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
  <foaf:Project rdf:about="info:eu-repo/grantAgreement/EC/H2020/739578/">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">739578</dct:identifier>
    <dct:title>Research Center on Interactive Media, Smart System and Emerging Technologies</dct:title>
    <frapo:isAwardedBy>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </frapo:isAwardedBy>
  </foaf:Project>
</rdf:RDF>
16
11
views
downloads
Views 16
Downloads 11
Data volume 14.9 MB
Unique views 15
Unique downloads 9

Share

Cite as