A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures
Abstract
:1. Introduction
2. Related Works
3. Named Data Networking Architecture
3.1. Names
3.2. Data-Centric Security
3.3. In-Network Caching
3.4. Packet Forwarding and Routing
3.5. Table Management
4. Streaming Applications Architecture over Named Data Networks
5. Cache Privacy
6. Side-Channel Timing Attack on Streaming Applications over NDN
6.1. Content Retrieval Time (CRT)
6.2. Possible Scope of Attack
7. Attack and Countermeasure Designs
7.1. Attack Design
7.2. Countermeasure Design
8. Implementation and Results
8.1. Scenario Implementation
8.2. Brute-Force Attack Results
8.3. Countermeasure Results
9. Discussion
Supplementary Materials
Author Contributions
Funding
Conflicts of Interest
References
- Zhang, L.; Estrin, D.; Burke, J.; Jacobson, V.; Thornton, J.D.; Smetters, D.K.; Zhang, B.; Tsudik, G.; Massey, D.; Papadopoulos, C.; et al. Named Data Networking (NDN) Project; Technical Report; NDN-001; 2010; Available online: https://named-data.net/wp-content/uploads/TR001ndn-proj.pdf (accessed on 12 April 2022).
- Acs, G.; Conti, M.; Gasti, P.; Ghali, C.; Tsudik, G. Cache privacy in named-data networking. In Proceedings of the International Conference on Distributed Computing Systems, Philadelphia, PA, USA, 8–11 July 2013; pp. 41–51. [Google Scholar] [CrossRef]
- Mohaisen, A.; Mekky, H.; Zhang, X.; Xie, H.; Kim, Y. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 2015, 12, 675–687. [Google Scholar] [CrossRef]
- Bernardini, C.; Marchal, S.; Asghar, M.R.; Crispo, B. PrivICN: Privacy-preserving content retrieval in information-centric networking. Comput. Netw. 2019, 149, 13–28. [Google Scholar] [CrossRef]
- Felten, E.W.; Schneider, M.A. Timing attacks on Web privacy. In Proceedings of the 7th ACM conference on Computer and Communications Security—CCS ’00, Athens, Greece, 1–4 November 2000; pp. 25–32. [Google Scholar] [CrossRef] [Green Version]
- DiBenedetto, S.; Gasti, P.; Tsudik, G.; Uzun, E. ANDaNA: Anonymous Named Data Networking Application. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, 6–9 February 2011. [Google Scholar] [CrossRef]
- Bortz, A.; Boneh, D. Exposing private information by timing web applications. In Proceedings of the 16th International Conference on World Wide Web—WWW ’07, Banff, AB, Canada, 8–12 May 2007; p. 621. [Google Scholar] [CrossRef]
- Crosby, S.A.; Wallach, D.S.; Riedi, R.H. Opportunities and Limits of Remote Timing Attacks. ACM Trans. Inf. Syst. Secur. 2009, 12, 1–29. [Google Scholar] [CrossRef]
- Bernstein, D.J. Cache-Timing Attacks on AES. 2004, p. 37. Available online: https://cr.yp.to/antiforgery/cachetiming-20050414.pdf (accessed on 12 April 2022).
- Chaabane, A.; De Cristofaro, E.; Kaafar, M.A.; Uzun, E. Privacy in Content-Oriented Networking: Threats and Countermeasures. ACM SIGCOMM Comput. Commun. Rev. 2012, 43, 26–33. [Google Scholar] [CrossRef]
- Schinzel, S. An Efficient Mitigation Method for Timing Side Channels on the Web. In Proceedings of the 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), Darmstadt, Germany, 14 February 2011; pp. 1–6. [Google Scholar]
- Mangili, M.; Martignon, F.; Paraboschi, S. A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks. Comput. Netw. 2015, 76, 126–145. [Google Scholar] [CrossRef]
- Ding, W.; Yan, Z.; Deng, R.H. A Survey on Future Internet Security Architectures. IEEE Access 2016, 4, 4374–4393. [Google Scholar] [CrossRef]
- Zhang, L.; Afanasyev, A.; Burke, J.; Jacobson, V.; Claffy, K.; Crowley, P.; Papadopoulos, C.; Wang, L.; Zhang, B. Named Data Networking. ACM SIGCOMM Comput. Commun. Rev. 2014, 44, 66–73. [Google Scholar] [CrossRef]
- Jacobson, V.; Smetters, D.K.; Thornton, J.D.; Plass, M.F.; Briggs, N.H.; Braynard, R.L. Networking Named Content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies—CoNEXT ’09, Rome, Italy, 1–4 December 2009; ACM Press: New York, NY, USA, 2009; Volume 30, p. 1. [Google Scholar] [CrossRef]
- Herouala, A.T.; Kerrache, C.A.; Ziani, B.; Calafate, C.T.; Lagraa, N.; Tahari, A.E.K. Controlling the Trade-Off between Resource Efficiency and User Satisfaction in NDNs Based on Naïve Bayes Data Classification and Lagrange Method. Future Internet 2022, 14, 48. [Google Scholar] [CrossRef]
- Herouala, A.T.; Ziani, B.; Kerrache, C.A.; el Karim Tahari, A.; Lagraa, N.; Mastorakis, S. CaDaCa: A new caching strategy in NDN using data categorization. Multimed. Syst. 2022. [Google Scholar] [CrossRef]
- Yi, C.; Afanasyev, A.; Wang, L.; Zhang, B.; Zhang, L. Adaptive forwarding in named data networking. ACM SIGCOMM Comput. Commun. Rev. 2012, 42, 62. [Google Scholar] [CrossRef] [Green Version]
- Afanasyev, A.; Shi, J.; Zhang, B.; Zhang, L.; Moiseenko, I.; Afanasyev, A.; Shi, J.; Yu, Y.; Shang, W.; Li, Y.; et al. NFD Developer’s Guide; Technical Report; NDN-0021; 2018; Available online: https://www.researchgate.net/publication/325670481_NFD_Developer%27s_Guide?channel=doi&linkId=5b1cb0d30f7e9b68b42b0ba4&showFulltext=true (accessed on 12 April 2022).
- Kulinski, D.; Burke, J. NDNVideo: Live and Pre-Recorded Streaming Using NDN; Technical Report; NDN-0007; pp. 1–17. Available online: https://named-data.net/publications/techreports/trstreaming/ (accessed on 12 April 2022).
- Gusev, P.; Burke, J. NDN-RTC: Real-Time Videoconferencing over Named Data Networking. In Proceedings of the 2nd International Conference on Information-Centric Networking—ICN ’15, San Francisco, CA, USA, 30 September–2 October 2015; pp. 117–126. [Google Scholar] [CrossRef]
- Wang, L. NDNlive and NDNtube: Live and Prerecorded Video Streaming over NDN; Technical Report; NDN-0031; pp. 1–10. Available online: https://named-data.net/publications/techreports/ndn-0031-1-ndnlive-ndntube/ (accessed on 12 April 2022).
- Gusev, P.; Wang, Z.; Burke, J.; Zhang, L.; Yoneda, T.; Ohnishi, R.; Muramoto, E. Real-Time Streaming Data Delivery over Named Data Networking. IEICE Trans. Commun. 2016, E99.B, 974–991. [Google Scholar] [CrossRef] [Green Version]
- Zhu, Z.; Wang, S.; Yang, X.; Jacobson, V.; Zhang, L. ACT: Audio Conference Tool Over Named Data Networking. In Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, Toronto, ON, Canada, 19 August 2011; Volume 11, p. 68. [Google Scholar] [CrossRef]
- Handley, M.; Jacobson, V.; Perkins, C. SDP: Session Description Protocol; RFC 4566; Technical Report; The Internet Society: Reston, VA, USA, 2006. [Google Scholar] [CrossRef] [Green Version]
- Mastorakis, S.; Gusev, P.; Afanasyev, A.; Zhang, L. Real-Time Data Retrieval in Named Data Networking. In Proceedings of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August 2018; pp. 61–66. [Google Scholar] [CrossRef]
- Ambrosin, M.; Compagno, A.; Conti, M.; Ghali, C.; Tsudik, G. Security and Privacy Analysis of National Science Foundation Future Internet Architectures. IEEE Commun. Surv. Tutor. 2018, 20, 1418–1442. [Google Scholar] [CrossRef]
- Compagno, A.; Conti, M.; Losiouk, E.; Tsudik, G.; Valle, S. A Proactive Cache Privacy Attack on NDN. In Proceedings of the NOMS 2020—2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Kocher, P.C. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems; Springer: Berlin, Germany, 1996; pp. 104–113. [Google Scholar] [CrossRef] [Green Version]
- Tobias Lauinger. Security & Scalability of Content-Centric Networking. Master’s Thesis, TU Darmstadt, Darmstadt, Germany, Eurécom, Sophia-Antipolis, France, 2010.
- Lauinger, T.; Laoutaris, N.; Rodriguez, P.; Strufe, T.; Biersack, E.; Kirda, E. Privacy risks in named data networking: What is the cost of performance? ACM SIGCOMM Comput. Commun. Rev. 2012, 42, 54–57. [Google Scholar] [CrossRef]
- Lauinger, T.; Laoutaris, N.; Rodriguez, P.; Strufe, T.; Biersack, E.; Kirda, E. Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures; Technical Report; 2012; Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.259.4413&rep=rep1&type=pdf (accessed on 26 February 2022).
- Naeem; Nor; Hassan; Kim. Compound Popular Content Caching Strategy in Named Data Networking. Electronics 2019, 8, 771. [Google Scholar] [CrossRef] [Green Version]
- Douglas, E. Comer. Internetworking with TCP/IP; Prentice-Hall: Hoboken, NJ, USA, 2000. [Google Scholar]
- Dogruluk, E.; Costa, A.; Macedo, J. Identifying Previously Requested Content by Side-Channel Timing Attack in NDN. In Communications in Computer and Information Science; Springer: Cham, Switzerland, 2018; Volume 878, pp. 33–46. [Google Scholar] [CrossRef]
- Dogruluk, E.; Costa, A.; Macedo, J. A Detection and Defense Approach for Content Privacy in Named Data Network. In Proceedings of the 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain, 24–26 June 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Pham, T.N.D.; Yeo, C.K.; Yanai, N.; Fujiwara, T. Detecting flooding attack and accommodating burst traffic in delay-tolerant networks. IEEE Trans. Veh. Technol. 2018, 67, 795–808. [Google Scholar] [CrossRef]
- Dogruluk, E.; Gama, O.; Costa, A.D.; Macedo, J. Public Key Certificate Privacy in VoNDN: Voice Over Named Data Networks. IEEE Access 2020, 8, 145803–145823. [Google Scholar] [CrossRef]
- Compagno, A.; Conti, M.; Gasti, P.; Mancini, L.V.; Tsudik, G. Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Applied Cryptography and Network Security, ACNS 2015; Springer: Cham, Switzerland, 2015; Volume 9092, pp. 243–262. [Google Scholar] [CrossRef]
- Psaras, I.; Chai, W.K.; Pavlou, G. Probabilistic in-network caching for information-centric networks. In Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking—ICN ’12, Helsinki, Finland, 17 August 2012; ACM Press: New York, NY, USA, 2012; p. 55. [Google Scholar] [CrossRef] [Green Version]
- Mastorakis, S.; Afanasyev, A.; Moiseenko, I.; Zhang, L. ndnSIM 2: An Updated NDN Simulator for NS-3; Technical Report; NDN-0028; 2016; Available online: https://named-data.net/publications/techreports/ndn-0028-2-ndnsim-v2/ (accessed on 12 April 2022).
Inputs | TIME | cacheHitTreshold |
auxiliary processes | getCacheHitRatio() | |
apply_defaultPolicy() | ||
apply_Delay() | ||
apply_Random() | ||
apply_noCache() | ||
attack states | ATTACK_DETECTED | delayPhase |
randomPhase | ||
noCachePhase | ||
NO_ATTACK_DETECTED | defaultPhase |
Network topology | AT&T |
Total nodes | 625 |
Backbones | 221 |
Attacked edge router | 108 routers |
Target quantity | ≈55% of total consumer nodes |
Adversary quantity | ≈45% of total consumer nodes |
Streaming producer | /ndntube/videos/ |
Consumers | /ndntube/videos/... |
Targets | /ndntube/videos/... |
Attack repetition | 4 for each target |
CS policies | LRU LFU FIFO |
CS size | 1000 packets |
CRT decisions | cached by edge node cached by neighbor node cached by away node |
Link Type | Delay | Bandwidth | ||
---|---|---|---|---|
Min. | Max. | Min. | Max. | |
Client–Gateway | 10 ms | 70 ms | 1 Mbps | 3 Mbps |
Gateway–Backbone. Gateway–Gateway | 5 ms | 10 ms | 10 Mbps | 20 Mbps |
Backbone–Backbone | 5 ms | 10 ms | 40 Mbps | 100 Mbps |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dogruluk, E.; Macedo, J.; Costa, A. A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures. Electronics 2022, 11, 1265. https://doi.org/10.3390/electronics11081265
Dogruluk E, Macedo J, Costa A. A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures. Electronics. 2022; 11(8):1265. https://doi.org/10.3390/electronics11081265
Chicago/Turabian StyleDogruluk, Ertugrul, Joaquim Macedo, and Antonio Costa. 2022. "A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures" Electronics 11, no. 8: 1265. https://doi.org/10.3390/electronics11081265
APA StyleDogruluk, E., Macedo, J., & Costa, A. (2022). A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking Architectures. Electronics, 11(8), 1265. https://doi.org/10.3390/electronics11081265