DocumentCode
623131
Title
Mitigating brute-force attacks on Bloom-filter based forwarding
Author
Alzahrani, Bander A. ; Vassilakis, V.G. ; Reed, Martin J.
Author_Institution
Sch. of Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK
fYear
2013
fDate
15-16 May 2013
Firstpage
1
Lastpage
7
Abstract
The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and determine the time required by the attacker to launch a successful attack. We find that using scenarios reported by other researchers this type of attacks is achievable in few seconds, which is unacceptable. The paper proposes a solution to mitigate the brute-force attacks by significantly increasing the time before a successful attack. Consequently, it is possible to change link identifiers before the attacker can adapt to the changes. We evaluate the proposed solution in terms of network security and scalability.
Keywords
computer network security; data structures; probability; telecommunication network routing; unsolicited e-mail; DDoS attacks; ICN; bloom-filter based forwarding; brute-force attacks; distributed denial-of-service attacks; in-packet Bloom filter forwarding mechanism; information-centric networking; network scalability; network security; probability; source routing approach; spam; unsolicited messages; Computer architecture; Educational institutions; Network topology; Routing; Scalability; Security; Subscriptions; Bloom filter; Distributed Denial-of-Service; Information-Centric Networks; zFilter;
fLanguage
English
Publisher
ieee
Conference_Titel
Future Internet Communications (CFIC), 2013 Conference on
Conference_Location
Coimbra
Type
conf
DOI
10.1109/CFIC.2013.6566320
Filename
6566320
Link To Document