文档介绍:Mitigate DDoS Attacks in NDN by Interest Traceback Huichen Dai, Yi Wang, Jindou Fan, Bin Liu Tsinghua National Laboratory for Information Science and Technology Dept. puter Science and Technology, Tsinghua University {dhc10, yiwang09, fjd07}***@., ******@tsinghua. Abstract—Current is reaching the limits of its capabili- ties due to its function transition from host-to-munication to content dissemination. Named working (NDN) – an instantiation of Content-working approach, embraces this shift by stressing the content itself, rather than where it locates. NDN tries to provide better security and privacy than current does, and resilience to Distributed Denial of Service (DDoS) is a signi?cant issue. In this paper, we present a speci?c and concrete scenario of DDoS attack in NDN, where perpetrators make use of NDN’s packet forwarding rules to send out Interest packets with spoofed names as attacking packets. Afterwards, we identify the victims of NDN DDoS attacks include both the hosts and routers. But the largest victim is not the hosts, but the routers, more speci?cally, the Pending Interest Table (PIT) within the router. PIT brings NDN many elegant features, but it suffers from vulnerability. We proposeInterest tracebackas a counter measure against the studied NDN DDoS attacks, which traces back to the originator of the attacking Interest packets. At last, we assess th