0704-883-0675     |      dataprojectng@gmail.com

Forwarding loop attacks and counter measures in content centric networks

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

ABSTRACT

Content Centric Networking (CCN) is a novel networking approach that aims at overcoming some of the limitations of the current Internet. In particular, CCN aims at providing better security and privacy by focusing on the data rather than on the location of data. However, this new networking concept opens up avenues for launching several new types of attacks including the “Forwarding Loop attacks”. This paper describes how malicious customers can attack the availability of Content Centric Networks (CCNs) by creating forwarding loops. These loops cause one request to be processed repeatedly or even indefinitely, resulting in unwanted resource consumption and potential Denial-of-Service attacks. Next, we propose detection and mitigation techniques that will allow routers to identify and prevent the formation of such loops. To evaluate the practicality of such forwarding-loop attacks, we use the popular CCN simulation software, ndnSIM to simulate the occurrences of the loops and show how they can affect the overall service of the network.




FIND OTHER RELATED TOPICS


Related Project Materials

EFFECT OF CARTOONS ON PUPILS INTEREST AND ACHIEVEMENT IN ENVIRONMENTAL EDUCATION IN BASIC SCIENCE AND TECHNOLOGY

ABSTRACT

This study investigated the effect of cartoons on pupils’ interest and achievement in environmental education (EE) in Basi...

Read more
THE ROLE OF DATA ANALYTICS IN DETECTING FINANCIAL REPORTING ANOMALIES

Abstract:

This study examines the role of data analytics in detecting financial reporting anomalies in...

Read more
MULTIVARIATE ANALYSIS OF THE WATER QUALITY IN THE MIDDLE STRETCH OF RIVER KADUNA (MALALI – RIGASA)

ABSTRACT

The water in River Kaduna is used for; domestic purposes, fishing, recreational activities as well as irrigation of crops.Howeve...

Read more
AN EVALUATION OF FADAMA III POLICY ON RURAL DEVELOPMENT IN ETHIOPE WEST LOCAL GOVERNMENT AREA OF DELTA STATE

ABSTRACT

The study examines, critically, policies and programs and their varying degrees of successes as it relates to description, expla...

Read more
INNOVATIVE TECHNOLOGIES AS A CORRELATION OF LIBRARY SERVICE DELIVERY IN THE BELLS UNIVERSITY, OTA, OGUN STATE

BACKGROUND OF THE STUDY

Libraries are mainly entrusted with a host of predetermined tasks like acquiring, organizing, pr...

Read more
THE INFLUENCE OF DIGITAL TECHNOLOGIES ON CUSTOMER NEEDS ASSESSMENT

THE INFLUENCE OF DIGITAL TECHNOLOGIES ON CUSTOMER NEEDS ASSESSMENT

 

This study investigated the influence of digital tech...

Read more
EVALUATION OF ANTITRYPANOSOMAL EFFECT OF STEM-BARK EXTRACTS OF SECURIDACA LONGEPEDUNCULATA (FRES. HOLL) AGAINST TRYPANOSOMA BRUCEI BRUCEI INFECTION IN WISTAR RATS

ABSTRACT

Due to numerous problems associated with current treatment of trypanosomosis, there is increasing need to find effective drug ag...

Read more
ECONOMIC ANALYSIS OF PIG PRODUCTION

Background of the Stud...

Read more
DETERMINANTS OF SOFTWARE ADOPTION AND USE FOR AUTOMATION IN ACADEMIC LIBRARY IN ANAMBRA AND EBONYI STATE

BACKGROUND OF THE STUDY

There are large amount of information being generated on daily basis and it is...

Read more
THE PROSPECTS AND CHALLENGES OF FIDUCIARY ACCOUNTING FOR NON-TRADITIONAL ASSETS

THE PROSPECTS AND CHALLENGES OF FIDUCIARY ACCOUNTING FOR NON-TRADITIONAL ASSETS

Abstract: Fiduciary accounting for non-traditional assets...

Read more
Share this page with your friends




whatsapp