Interest flooding attacks in named data networking: survey of existing solutions, open issues, requirements, and future directions

A Benmoussa, CA Kerrache, N Lagraa… - ACM Computing …, 2022 - dl.acm.org
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric
Networking. The NDN architecture adopts name-based routing and location-independent …

A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges

RT Lee, YB Leau, YJ Park, M Anbar - IETE Technical Review, 2022 - Taylor & Francis
ABSTRACT Internet of Things (IoT) allows all entities such as computing devices, machines,
objects, people, etc., to interact with each other through their Internet Protocol (IP) addresses …

GNN4IFA: Interest flooding attack detection with graph neural networks

A Agiollo, E Bardhi, M Conti, R Lazzeretti… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
In the context of Information-Centric Networking, Interest Flooding Attacks (IFAs) represent a
new and dangerous sort of distributed denial of service. Since existing proposals targeting …

A survey on security attacks and intrusion detection mechanisms in named data networking

A Hidouri, N Hajlaoui, H Touati, M Hadded… - Computers, 2022 - mdpi.com
Despite the highly secure content sharing and the optimized forwarding mechanism, the
content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities …

The emerging of named data networking: Architecture, application, and technology

WMH Azamuddin, AHM Aman, H Sallehuddin… - IEEE …, 2023 - ieeexplore.ieee.org
Named Data Networking (NDN) is developed to accommodate future-oriented internet traffic.
In recent years, NDN's popularity has grown due to the evolution of the Internet of Things …

A novel sensitive DDoS attacks against statistical test in network traffic fusion

M Kulandaivel, G Kumar… - Transactions on …, 2023 - Wiley Online Library
Distributed denial of service (DDoS) attacks are common attacks that limit casual users from
cracking critical network resources. A method to find the DDoS attack comes to light as an …

Detecting interest flooding attacks in NDN: A probability-based event-driven approach

MK Kumari, N Tripathi - Computers & Security, 2025 - Elsevier
The foundational concepts of the Internet were developed in the 1960s and 1970s with the
goal of interconnecting hosts using the TCP/IP architecture. While this architecture has …

Detecting and mitigating collusive interest flooding attacks in named data networking

RA Al-Share, AS Shatnawi, B Al-Duwairi - IEEE Access, 2022 - ieeexplore.ieee.org
The large expansion in network services and applications seen in the last few years requires
new network architectures to satisfy an increasing number of users and enhance content …

Attention‐Based LSTM Model for IFA Detection in Named Data Networking

X Zhang, R Li, W Hou - Security and Communication Networks, 2022 - Wiley Online Library
As one of the next generation networks, Named Data Networking (NDN) performs well on
content distribution. However, it is vulnerable against a new type of denial‐of‐service (DoS) …

Node authentication and trust-aware secure routing in NDN-IoT empowered savvy city applications

B Patil, D Vydeki - Wireless Personal Communications, 2023 - Springer
The emergence of the Internet of Things (IoT) technology leads to significant growth in the
development of smart urban regions. IoT connects the different infrastructures and municipal …