0704-883-0675     |      dataprojectng@gmail.com

Forwarding loop attacks and counter measures in content centric networks

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 5000

ABSTRACT

Content Centric Networking (CCN) is a novel networking approach that aims at overcoming some of the limitations of the current Internet. In particular, CCN aims at providing better security and privacy by focusing on the data rather than on the location of data. However, this new networking concept opens up avenues for launching several new types of attacks including the “Forwarding Loop attacks”. This paper describes how malicious customers can attack the availability of Content Centric Networks (CCNs) by creating forwarding loops. These loops cause one request to be processed repeatedly or even indefinitely, resulting in unwanted resource consumption and potential Denial-of-Service attacks. Next, we propose detection and mitigation techniques that will allow routers to identify and prevent the formation of such loops. To evaluate the practicality of such forwarding-loop attacks, we use the popular CCN simulation software, ndnSIM to simulate the occurrences of the loops and show how they can affect the overall service of the network.




FIND OTHER RELATED TOPICS


Related Project Materials

EMPLOYMENT OPPORTUNITIES FOR GRADUATE OF OFFICE TECHNOLOGY AND MANAGEMENT

ABSTRACT

The purpose of this study is to survey the Employment Opportunities for Graduate of Office Tec...

Read more
GENDER ISSUES IN AGRICULTURE AND RURAL DEVELOPMENT IN NIGERIA: THE ROLE OF WOMEN

Background of the Study

The first and most important component of food security is the practice of environmentally susta...

Read more
ANALYSIS OF COMPUTERIZED DRUG DISPENSING SYSTEM

  1. Background of the Study

Globally, electronic prescription, often known as EP, is an essential component...

Read more
Assessing the Use of Social Media Polls in Shaping Event Content in Lokoja Local Government Area, Kogi State

Chapter One: Introduction

1.1 Background of the Study

Social media platforms have revolutioni...

Read more
INFORMATION SOURCES AND SERVICES PROVISION FOR CONFLICT RESOLUTION IN NORTHERN STATES OF NIGERIA

ABSTRACT

This study investigated the Information Sources and Services Provision for Conflict Resolution in Northern States of Nigeria. A...

Read more
AN EVALUATION OF TEACHING AND LEARNING GRAMMATICAL STRUCTURES IN SELECTED PRIMARY SCHOOLS

BACKGROUND OF THE STUDY

In today's culture, both the teaching of and the study of the English language are considere...

Read more
SKILLS COMPETENCE AND ICT INTEGRATION IN TEACHER EDUCATION

ABSTRACT

The study investigated the level of Skills Proficiency and ICT Integration in Lecturer educati...

Read more
The Impact of Zoning Arrangements on Political Party Success in Awe Local Government Area, Nasarawa State

Background of the Study

Zoning, a practice in Nigerian politics, refers to the arrangement where politi...

Read more
EFFECTS OF STAFF MOTIVATION ON JOB PERFORMANCE

Read more
An assessment of risk mitigation strategies in global supply chains: A study of Dangote Group in Borno State

Background of the Study

Risk mitigation strategies in supply chain management are essential for addressing uncertainties...

Read more
Share this page with your friends




whatsapp