Named Data Networking (NDN) has the potential to create a more secure future Internet. It is therefore crucial to investigate its vulnerabilities in order to make it safer against information leakage attacks. In NDN, malware inside an enterprise can encode condential information into Interest names and send it to the attacker. One of the countermeasures is to inspect a name in the Interest using a name lter and identify it as legitimate or anomalous. Although the name lter can dramatically decrease the information leakage throughput per Interest, it has a serious disadvantage: it does not consider a ow of Interests. This means that the malware can not only cause information leakage, but even improve the speed of the attack by aggressively p...
Named Data Networking (NDN) is one of the examples of Content Oriented Networking to be the prospect...
International audienceNDN is the most mature proposal of the ICN paradigm, a clean-slate approach fo...
Abstract—With the growing realization that current Internet protocols are reaching the limits of the...
International audienceInformation-leakage is one of the most importantsecurity issues in the current...
International audienceNamed Data Networking (NDN) has emerged as a future networking architecture ha...
The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Inform...
In recent years, Named Data Networking (NDN) has emerged as one of the most promising future network...
International audienceProposals for Information Centric Networking (ICN) have recently emerged to re...
International audienceNamed Data Networking (NDN) is a disruptive yet promising architecture for the...
Named-Data Networking (NDN) is a potential Future Internet Architectures which introduces a shift fr...
Several ongoing research efforts aim to design potential Future Internet Architectures, among which ...
International audienceNamed Data Networking (NDN) is the most mature proposal of the Information Cen...
National audienceThe IP network, which was originally designed to merely connect two computers from ...
Abstract—Current Internet is reaching the limits of its capabili-ties due to its function transition...
Part 2: Security and Network ManagementInternational audienceNamed-Data Networking (NDN) is a potent...
Named Data Networking (NDN) is one of the examples of Content Oriented Networking to be the prospect...
International audienceNDN is the most mature proposal of the ICN paradigm, a clean-slate approach fo...
Abstract—With the growing realization that current Internet protocols are reaching the limits of the...
International audienceInformation-leakage is one of the most importantsecurity issues in the current...
International audienceNamed Data Networking (NDN) has emerged as a future networking architecture ha...
The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Inform...
In recent years, Named Data Networking (NDN) has emerged as one of the most promising future network...
International audienceProposals for Information Centric Networking (ICN) have recently emerged to re...
International audienceNamed Data Networking (NDN) is a disruptive yet promising architecture for the...
Named-Data Networking (NDN) is a potential Future Internet Architectures which introduces a shift fr...
Several ongoing research efforts aim to design potential Future Internet Architectures, among which ...
International audienceNamed Data Networking (NDN) is the most mature proposal of the Information Cen...
National audienceThe IP network, which was originally designed to merely connect two computers from ...
Abstract—Current Internet is reaching the limits of its capabili-ties due to its function transition...
Part 2: Security and Network ManagementInternational audienceNamed-Data Networking (NDN) is a potent...
Named Data Networking (NDN) is one of the examples of Content Oriented Networking to be the prospect...
International audienceNDN is the most mature proposal of the ICN paradigm, a clean-slate approach fo...
Abstract—With the growing realization that current Internet protocols are reaching the limits of the...