Cache attacks on blockchain based information centric networks: an experimental evaluation

Swapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, M. Chatterjee
{"title":"Cache attacks on blockchain based information centric networks: an experimental evaluation","authors":"Swapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, M. Chatterjee","doi":"10.1145/3288599.3288640","DOIUrl":null,"url":null,"abstract":"Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 20th International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3288599.3288640","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of the growing number of cyber attacks. Though there have been several studies related to denial of service and cache attacks, those studies are primarily based on simulations and investigations of attacks on real networks are still lacking. In this paper, we experimentally investigated the effects of cache attacks on blockchain based information-centric networks. We used the hyperledger fabric to implement the blockchains for small and medium-sized networks. We implemented cache attacks where the attacker target the cache with unpopular content, forcing the user to fetch the data from the web servers. We experimented with two different topologies (linear and mesh) and also considered two cache sizes at the nodes. Three cache replacement policies were used: Least Recently Used, Random, and First In First Out. The cache hit, time taken to get the data, and the number of hops to serve the request were obtained with real network traffic. On the hyperledger fabric framework, we implemented two types of requests and showed how the query delay, invoke delay, and update delay vary with time. Based on our results, we find that most of the information centric networks, including the ones based on blockchains, are vulnerable to cache attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于区块链的信息中心网络缓存攻击:实验评估
由于越来越多的网络攻击,保护和保护驻留在互联网上不同主机上的数据变得比以往任何时候都更加重要。虽然已经有一些关于拒绝服务和缓存攻击的研究,但这些研究主要是基于对真实网络攻击的模拟和调查,仍然缺乏。在本文中,我们实验研究了缓存攻击对基于区块链的信息中心网络的影响。我们使用超级账本结构来实现中小型网络的区块链。我们实现了缓存攻击,攻击者以不受欢迎的内容为目标缓存,迫使用户从web服务器获取数据。我们尝试了两种不同的拓扑(线性和网状),并考虑了节点上的两种缓存大小。使用了三种缓存替换策略:最近最少使用、随机和先进先出。缓存命中、获取数据所需的时间以及为请求提供服务的跳数都是通过真实的网络流量获得的。在超级分类账结构框架上,我们实现了两种类型的请求,并展示了查询延迟、调用延迟和更新延迟如何随时间变化。根据我们的研究结果,我们发现大多数以信息为中心的网络,包括基于区块链的网络,都容易受到缓存攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improving efficacy of concurrent internal binary search trees using local recovery An accurate missing data prediction method using LSTM based deep learning for health care A simple and practical concurrent non-blocking unbounded graph with linearizable reachability queries EnTER: an encounter based trowbox deployment strategy for enhancing network reliability in post-disaster scenarios over DTN Exploration and impact of blockchain-enabled adaptive non-binary trust models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1