Abstract

IEEEThe prerequisites of the fifth-generation network (5G) is the latency of 1–10 ms, to work with wide range of bandwidth start from 100 Mbps to 10 Gbps. We studied Named Data Networking (NDN) resistance against attacks that can interfere with the availability of the network. One of the potential threats to NDN is the Interest Flooding Attack (IFA). IFA is similar to the Denial of Services (DoS)/Distributed Denial of Services (DDoS) on IP-based networks. In this paper, we evaluate the IFA against varied data payload, round-trip time, the duration of attack, and range of allocated bandwidth with goal to determine the parameter that could affect the performance issue of the mitigation system. We do this works using a custom Rocketfuel ISP-like topology that has been ported to NS-3 and ndnSIM version 1.0. We run the simulation on Ubuntu 14.04.5 32 bit. The experiment results show that the Satisfaction Pushback countermeasure method is more reliable on facing IFA attacks. The duration of attacks, RTT values and data payload packet size have a significant impact in certain simulation condition. The great combination of these three parameters could reduce the network performance up to 63%.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call