Effectiveness of Cache Pollution Attacks in ICN Cache Services

dc.contributor.advisorLent, Ricardo
dc.contributor.committeeMemberYuan, Xiaojing
dc.contributor.committeeMemberBenhaddou, Driss
dc.creatorKarimipoor, Andia
dc.creator.orcid0000-0002-2183-1327
dc.date.accessioned2018-03-02T21:24:51Z
dc.date.available2018-03-02T21:24:51Z
dc.date.createdDecember 2016
dc.date.issued2016-12
dc.date.submittedDecember 2016
dc.date.updated2018-03-02T21:24:51Z
dc.description.abstractInformation-centric networking is a new technique for future Internet. The current Internet architecture was designed based on a host to host communication. In recent years there have been several efforts to replace the current IP-based Internet. The key idea of ICN is that the user will focus more on what exactly they want rather than from where to get the content. Different ICN architectures have developed. CCN (content centric networking), NDN (named data networks) and CDN (content delivery networks) are examples of ICN architectures. ICN has different structure than the host to host networks in terms of naming, routing, security and caching. All these new terms created the chance of new security threats and attacks on network. One of these security threats is possible attacks on ICN cache services. In this Master thesis, we have studied cache pollution attacks on information centric networking and investigated the network performance by comparing the normal system to a system under cache pollution attacks. Delay and path length are the parameters that we have studied in both cases. However, we defined different caching sizes and policies to see the impact of attack, on small network versus large network and later, we extended our research by studying the impact of the attack on network when we have different attack and attack detection probabilities. It intends to tackle the challenges of security concerns on ICN cache services. The evolution of new network architecture raise great challenges to study security attacks on ICN. Therefore, we implemented an ICN architecture with python and we simulated the cache pollution attacks using FIFO and LRU caching policies to analyze the effectiveness of attack on different scale networks. We designed our large network topology inspired by Gnutella's networks which are considered large peer to peer networks.
dc.description.departmentEngineering Technology, Department of
dc.format.digitalOriginborn digital
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10657/2769
dc.language.isoeng
dc.rightsThe author of this work is the copyright owner. UH Libraries and the Texas Digital Library have their permission to store and provide access to this work. Further transmission, reproduction, or presentation of this work is prohibited except with permission of the author(s).
dc.subjectContent delivery networks
dc.subjectCache
dc.subjectICN
dc.subjectPollution attacks
dc.subjectLRU
dc.subjectFIFO
dc.titleEffectiveness of Cache Pollution Attacks in ICN Cache Services
dc.type.dcmiText
dc.type.genreThesis
thesis.degree.collegeCollege of Technology
thesis.degree.departmentEngineering Technology, Department of
thesis.degree.disciplineEngineering Technology
thesis.degree.grantorUniversity of Houston
thesis.degree.levelMasters
thesis.degree.nameMaster of Science

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
KARIMIPOOR-THESIS-2016.pdf
Size:
808.28 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
LICENSE.txt
Size:
1.82 KB
Format:
Plain Text
Description: