Journal of Computer Applications ›› 2015, Vol. 35 ›› Issue (6): 1688-1692.DOI: 10.11772/j.issn.1001-9081.2015.06.1688
Previous Articles Next Articles
ZHENG Linhao, TANG Hongbo, GE Guodong
Received:
2015-01-04
Revised:
2015-02-11
Online:
2015-06-12
郑林浩, 汤红波, 葛国栋
通讯作者:
郑林浩(1991-),男,河南辉县人,硕士研究生,主要研究方向:移动互联网、移动通信;zlh5268@163.com
作者简介:
汤红波(1968-),男,湖北孝感人,教授,主要研究方向:可移动网络、移动通信;葛国栋(1985-),男,陕西咸阳人,博士研究生,主要研究方向:可移动网络、移动通信。
基金资助:
国家973计划项目(2012CB315901);国家自然科学基金资助项目(61372121)。
CLC Number:
ZHENG Linhao, TANG Hongbo, GE Guodong. Cache pollution attack defense scheme based on cache diversification in content centric networking[J]. Journal of Computer Applications, 2015, 35(6): 1688-1692.
郑林浩, 汤红波, 葛国栋. 内容中心网络中基于多样化存储的缓存污染防御机制[J]. 计算机应用, 2015, 35(6): 1688-1692.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2015.06.1688
[1] Cisco visual networking index: global mobile data traffic forecast update 2013-2017 [R/OL]. [2009-11-17]. http//www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white-paper-c11-520862. [2] XYLOMENOS G, VERVERIDIS C, SIRIS V, et al. A survey of information-centric networking research[J]. IEEE Communications Surveys and Tutorials, 2014, 16(2): 1024-1049. [3] CHAABANE A, CRISTOFARO E D, KAAFAR M A, et al. Privacy in content-oriented networking: threats and countermeasures [J]. ACM SIGCOMM Computer Communication Review, 2013, 43(3): 25-33. [4] LAUINGER T. Security and scalability of content-centric networking [D]. Darmstadt: Technische Universität Darmstadt, 2010. [5] AFANASYEV A, MAHADEVAN P, MOISEENKO I, et al. Interest flooding attack and countermeasures in named data networking [C]//Proceedings of the 2013 IFIP Networking Conference. Piscataway: IEEE, 2013: 1-9. [6] KIM Y, YEOM I. Performance analysis of in-network caching for content-centric networking [J]. Computer Networks, 2013, 57(13): 2465-2482. [7] CONTI M, GASTI P, TEOLI M. A lightweight mechanism for detection of cache pollution attacks in named data networking [J]. Computer Networks, 2013, 57(16): 3178-3191. [8] PARK H, WIDJAJA I, LEE H. Detection of cache pollution attacks using randomness checks [C]//Proceedings of the 2012 IEEE International Conference on Communications. Piscataway: IEEE, 2012: 1096-1100. [9] XIE M, WIDJAJA I, WANG H. Enhancing cache robustness for content-centric networking [C]//2012 Proceedings IEEE INFOCOM. Piscataway: IEEE, 2012: 2426-2434. [10] SANDBERG A, EKLÖV D, HAGERSTEN E. Reducing cache pollution through detection and elimination of non-temporal memory accesses [C]//Proceedings of the 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis. Washington DC: IEEE Computer Society, 2010: 1-11. [11] LI H B, LI Y, LIN T, et al. MERTS: a more efficient real-time traffic support scheme for content centric networking [C]//Proceedings of the 2011 6th International Computer Sciences and Convergence Information Technology. Piscataway: IEEE, 2011: 528-533. [12] FRICKER C, ROBERT P, ROBERTS J, et al. Impact of traffic mix on caching performance in a content-centric network [C]//Proceedings of the 31th Annual International Conference on Computer Communications Workshops. Piscataway: IEEE, 2012: 310-315. [13] CAROFIGLIO G, GALLO M, MUSCARIELLO L, et al. Evaluating per-application storage management in content-centric networks [J]. Computer Communications, 2013, 36(7): 750-757. [14] PSARAS I, CHAI W K, PAVLOU G. Probabilistic in-network caching for information-centric networks [C]//Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking. New York: ACM, 2012: 55-60. [15] CHAABANE A, CRISTOFARO E D, KAAFAR M A, et al. Privacy in content-oriented networking: threats and countermeasures [J]. ACM SIGCOMM Computer Communication Review, 2013, 43(3): 25-33. [16] PSARAS I, CLEGG R G, LANDA R, et al. Modelling and evaluation of CCN-caching trees [C]//Proceedings of the 10th International IFIP TC6 Networking Conference on NETWORKING 2011, LNCS 6640. Berlin: Springer, 2011: 78-91. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||