Lauinger, Tobias (2010)
Security & Scalability of Content-Centric Networking.
Technische Universität Darmstadt
Masterarbeit, Erstveröffentlichung
Kurzbeschreibung (Abstract)
By suggesting radical changes to the current Internet, approaches to clean-slate architectures run the risk of introducing new opportunities for attacks. These attacks can range from new forms of denial-of-service to attacks against other users’ privacy. In this thesis, we analyse the architecture proposed by Content-Centric Networking from a security perspective. One security-critical feature of Content-Centric Networking is the introduction of general-purpose caches that are shared by a small number of users. We show how attackers can leverage these caches to monitor what content its users are retrieving. More generally, we argue that there is a tradeoff between network efficiency and user privacy. Countermeasures against cache-based privacy attacks need to carefully explore this tradeoff.
Typ des Eintrags: | Masterarbeit | ||||||
---|---|---|---|---|---|---|---|
Erschienen: | 2010 | ||||||
Autor(en): | Lauinger, Tobias | ||||||
Art des Eintrags: | Erstveröffentlichung | ||||||
Titel: | Security & Scalability of Content-Centric Networking | ||||||
Sprache: | Englisch | ||||||
Referenten: | Strufe, Prof. Dr. Thorsten ; Biersack, Prof. Dr. Ernst | ||||||
Publikationsjahr: | 6 September 2010 | ||||||
Datum der mündlichen Prüfung: | 27 September 2010 | ||||||
URL / URN: | urn:nbn:de:tuda-tuprints-22757 | ||||||
Kurzbeschreibung (Abstract): | By suggesting radical changes to the current Internet, approaches to clean-slate architectures run the risk of introducing new opportunities for attacks. These attacks can range from new forms of denial-of-service to attacks against other users’ privacy. In this thesis, we analyse the architecture proposed by Content-Centric Networking from a security perspective. One security-critical feature of Content-Centric Networking is the introduction of general-purpose caches that are shared by a small number of users. We show how attackers can leverage these caches to monitor what content its users are retrieving. More generally, we argue that there is a tradeoff between network efficiency and user privacy. Countermeasures against cache-based privacy attacks need to carefully explore this tradeoff. |
||||||
Alternatives oder übersetztes Abstract: |
|
||||||
Sachgruppe der Dewey Dezimalklassifikatin (DDC): | 000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik | ||||||
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik > Peer-to-Peer Netzwerke 20 Fachbereich Informatik |
||||||
Hinterlegungsdatum: | 18 Nov 2010 09:00 | ||||||
Letzte Änderung: | 05 Mär 2013 09:41 | ||||||
PPN: | |||||||
Referenten: | Strufe, Prof. Dr. Thorsten ; Biersack, Prof. Dr. Ernst | ||||||
Datum der mündlichen Prüfung / Verteidigung / mdl. Prüfung: | 27 September 2010 | ||||||
Export: | |||||||
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |