International audienceThe orchestration of countermeasures in the context of security incidents remains a challenging task for network operators. The main objective of this demonstration is to present how this orchestration is possible in the context of a virtualized NDN network. Based on an adaptation of the TOSCA topology and orchestration model, it is possible to trigger these countermeasures after the detection of NDN specific attacks. We show how the Montimage Monitoring Tool (MMT) has been adapted to detect typical Content Poisoning Attack (CPA), and how the orchestrator can trigger reactions to mitigate their impact on the network
We present a testbed implementation for the development, evaluation and demonstration of security or...
International audienceIn this work, we describe two attack scenarios exploiting a NDN vulnerability ...
Content poisoning attacks are a significant problem in Information Centric Networks (ICN), such as N...
International audienceNDN is the most mature proposal of the ICN paradigm, a clean-slate approach fo...
Nowadays, the Internet has evolved far from itsinitial design. Motivated by growing change requireme...
International audienceCombining NFV fast service deployment and SDN fine grained control of data flo...
International audienceNamed Data Networking (NDN) is the most mature proposal of the Information Cen...
The current architecture of the Internet has been designed to connect remote hosts. But the evolutio...
The current architecture of the Internet has been designed to connect remote hosts. But the evolutio...
International audienceNetwork operators are currently very cautious before deploying a new network e...
International audienceInformation Centric Networking (ICN) is seen as a promising solution to re-con...
National audienceThe IP network, which was originally designed to merely connect two computers from ...
International audienceNetwork Function Virtualization (NFV) is a novel paradigm which enables the de...
In recent years, Named Data Networking (NDN) has emerged as one of the most promising future network...
Internet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are ...
We present a testbed implementation for the development, evaluation and demonstration of security or...
International audienceIn this work, we describe two attack scenarios exploiting a NDN vulnerability ...
Content poisoning attacks are a significant problem in Information Centric Networks (ICN), such as N...
International audienceNDN is the most mature proposal of the ICN paradigm, a clean-slate approach fo...
Nowadays, the Internet has evolved far from itsinitial design. Motivated by growing change requireme...
International audienceCombining NFV fast service deployment and SDN fine grained control of data flo...
International audienceNamed Data Networking (NDN) is the most mature proposal of the Information Cen...
The current architecture of the Internet has been designed to connect remote hosts. But the evolutio...
The current architecture of the Internet has been designed to connect remote hosts. But the evolutio...
International audienceNetwork operators are currently very cautious before deploying a new network e...
International audienceInformation Centric Networking (ICN) is seen as a promising solution to re-con...
National audienceThe IP network, which was originally designed to merely connect two computers from ...
International audienceNetwork Function Virtualization (NFV) is a novel paradigm which enables the de...
In recent years, Named Data Networking (NDN) has emerged as one of the most promising future network...
Internet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are ...
We present a testbed implementation for the development, evaluation and demonstration of security or...
International audienceIn this work, we describe two attack scenarios exploiting a NDN vulnerability ...
Content poisoning attacks are a significant problem in Information Centric Networks (ICN), such as N...