Abstract
Content-Centric Networking (CCN) is one of the most promising research area for a future Internet. The goal is to obtain a more scalable, secure, collaborative Internet supporting context-aware services. However, as a new overlay infrastructure, CCN raises the need of a new monitoring architecture to assess security of CCN devices. In particular, the stateful nature of CCN routers introduces new attack threats that need to be addressed. We propose in this paper a monitoring approach for the instrumentation of CCN enabled network nodes. The rationale of our monitoring approach is demonstrated through real experimentations to detect and mitigate network level attacks against CCN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
CCNDSMOKETEST Manual Page, http://www.ccnx.org/releases/latest/doc/manpages/ccndsmoketest.1.html
Content Centric Networking, http://www.ccnx.org
Named Data Networking, http://named-data.net
Baccala, B.: Data-oriented networking. INTERNET-DRAFT (August 2002)
Carofiglio, G., Gallo, M., Muscariello, L., Perino, D.: Modeling data transfer in content-centric networking. In: Proceedings of the 23rd International Teletraffic Congress. pp. 111–118. ITC 2011, ITCP (2011), http://dl.acm.org/citation.cfm?id=2043468.2043487
Cheriton, D.R., Gritter, M.: Triad: A new next-generation internet architecture (July 2000)
Cristianini, N., Shawe-Taylor, J.: An introduction to support Vector Machines: and other kernel-based learning methods. Cambridge University Press, New York (2000)
Dannewitz, C., Herlich, M., Bauer, E., Becker, M., Beister, F., Dertmann, N., Hrestic, R., Kionka, M., Mohr, M., Mühe, M., Murali, D., Steffen, F., Stey, S., Unruh, E., Wang, Q., Weber, S.: Opennetinf documentation design and implementation (September 2011)
Debnath, R., Takahide, N., Takahashi, H.: A decision based one-against-one method for multi-class support vector machine. Pattern Anal. Appl. 7(2), 164–175 (2004)
DiBenedetto, S., Gasti, P., Tsudik, G., Uzun, E.: Andana: Anonymous named data networking application. CoRR abs/1112.2205 (2011), http://dblp.uni-trier.de/db/journals/corr/corr1112.html#abs-1112-2205
Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets 2011, 1:1–1:6. ACM, New York (2011)
Jacobson, V., Mosko, M., Smetters, D., Garcia-Luna-Aceves, J.J.: Content-centric networking: Whitepaper describing future assurable global networks. Response to DARPA RFI SN07-12 (2007)
Jacobson, V., Smetters, D.K., Briggs, N.H., Plass, M.F., Stewart, P., Thornton, J.D., Braynard, R.L.: VoCCN: voice-over content-centric networks. In: Proceedings of the 2009 Workshop on Re-architecting the Internet, ReArch 2009, pp. 1–6. ACM, New York (2009)
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2009, pp. 1–12. ACM, New York (2009)
Koponen, T., Chawla, M., Chun, B.G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I.: A data-oriented (and beyond) network architecture. In: Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2007, pp. 181–192. ACM, New York (2007)
Lauinger, T.: Security & scalability of content-centric networking (September 2010), http://tubiblio.ulb.tu-darmstadt.de/46912/
Särelä, M., Rinta-aho, T., Tarkoma, S.: RTFM: Publish/Subscribe Internetworking Architecture. ICT-MobileSummit Conference (2008)
Schulze, H., Mochalski, K.: Internet study 2008/2009 (2009)
Wang, L. (ed.): Support Vector Machines: Theory and Applications. STUDFUZZ, vol. 177. Springer (2005)
Zhang, L., Estrin, D., Burke, J., Jacobson, V., Thornton, J.D., Smetters, D.K., Zhang, B., Tsudik, G., kc claffy, Krioukov, D., Massey, D., Papadopoulos, C., Abdelzaher, T., Wang, L., Crowley, P., Yeh, E.: Named Data Networking (NDN) Project (October 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goergen, D., Cholez, T., François, J., Engel, T. (2013). Security Monitoring for Content-Centric Networking. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-35890-6_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35889-0
Online ISBN: 978-3-642-35890-6
eBook Packages: Computer ScienceComputer Science (R0)