{"id":"https://openalex.org/W7138925744","doi":"https://doi.org/10.1109/kst67832.2026.11432391","title":"Evaluating the Impact of Interest Flooding Attacks on Real-World NDN Router Deployments","display_name":"Evaluating the Impact of Interest Flooding Attacks on Real-World NDN Router Deployments","publication_year":2026,"publication_date":"2026-01-21","ids":{"openalex":"https://openalex.org/W7138925744","doi":"https://doi.org/10.1109/kst67832.2026.11432391"},"language":null,"primary_location":{"id":"doi:10.1109/kst67832.2026.11432391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kst67832.2026.11432391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 18th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129811103","display_name":"Jupriyadi","orcid":null},"institutions":[{"id":"https://openalex.org/I134635517","display_name":"Bandung Institute of Technology","ror":"https://ror.org/00apj8t60","country_code":"ID","type":"education","lineage":["https://openalex.org/I134635517"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Jupriyadi","raw_affiliation_strings":["School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia","institution_ids":["https://openalex.org/I134635517"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129897929","display_name":"Eueung Mulyana","orcid":null},"institutions":[{"id":"https://openalex.org/I134635517","display_name":"Bandung Institute of Technology","ror":"https://ror.org/00apj8t60","country_code":"ID","type":"education","lineage":["https://openalex.org/I134635517"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Eueung Mulyana","raw_affiliation_strings":["School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia","institution_ids":["https://openalex.org/I134635517"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023965601","display_name":"Nana Rachmana Syambas","orcid":"https://orcid.org/0000-0001-6682-6487"},"institutions":[{"id":"https://openalex.org/I134635517","display_name":"Bandung Institute of Technology","ror":"https://ror.org/00apj8t60","country_code":"ID","type":"education","lineage":["https://openalex.org/I134635517"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Nana Rachmana Syambas","raw_affiliation_strings":["School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia","institution_ids":["https://openalex.org/I134635517"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5129811103"],"corresponding_institution_ids":["https://openalex.org/I134635517"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.92918378,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"156","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.0005000000237487257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.7530999779701233},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.7366999983787537},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7156000137329102},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.6132000088691711},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.5649999976158142},{"id":"https://openalex.org/keywords/information-centric-networking","display_name":"Information-centric networking","score":0.36970001459121704}],"concepts":[{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.7530999779701233},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.7366999983787537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7351999878883362},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7260000109672546},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7156000137329102},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.6132000088691711},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.5649999976158142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4072999954223633},{"id":"https://openalex.org/C2777455782","wikidata":"https://www.wikidata.org/wiki/Q18208068","display_name":"Information-centric networking","level":3,"score":0.36970001459121704},{"id":"https://openalex.org/C2781345722","wikidata":"https://www.wikidata.org/wiki/Q5308388","display_name":"Drop (telecommunication)","level":2,"score":0.3564000129699707},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.3495999872684479},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.2890999913215637},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2827000021934509},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.26899999380111694}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kst67832.2026.11432391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kst67832.2026.11432391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 18th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Interest":[0,63],"Flooding":[1],"Attacks":[2],"(IFA)":[3],"and":[4,142],"their":[5],"coordinated":[6],"version,":[7],"Collusive":[8],"IFA":[9,120],"(CIFA),":[10],"are":[11,132],"serious":[12],"threats":[13],"in":[14,111],"Named":[15],"Data":[16],"Networking":[17],"(NDN)":[18],"because":[19,86,92],"they":[20],"exploit":[21],"the":[22,58,61,87,93,104],"stateful":[23],"nature":[24],"of":[25,117],"router":[26],"data":[27],"structures.":[28],"In":[29],"our":[30],"real-world":[31],"tests":[32],"using":[33],"NFD":[34],"on":[35],"resource-limited":[36],"virtual":[37],"hardware,":[38],"we":[39],"found":[40],"that":[41,136],"these":[42],"attacks":[43],"don't":[44],"hit":[45,79],"all":[46],"routers":[47],"equally\u2014only":[48],"specific":[49],"nodes":[50],"get":[51],"overwhelmed,":[52],"while":[53,83],"others":[54],"operate":[55],"normally.":[56],"On":[57],"affected":[59],"routers,":[60],"Pending":[62],"Table":[64],"(PIT)":[65],"gets":[66],"flooded":[67],"with":[68],"repeated,":[69],"unsatisfiable":[70],"requests,":[71],"which":[72],"severely":[73],"hurts":[74],"Content":[75],"Store":[76],"performance.":[77],"Cache":[78],"rates":[80],"drop":[81,146],"sharply":[82],"misses":[84],"spike\u2014not":[85],"cache":[88,114,143],"is":[89,95],"polluted,":[90],"but":[91],"system":[94],"bogged":[96],"down":[97],"by":[98],"excessive":[99],"pending":[100],"state.":[101],"Routers":[102],"outside":[103],"attack's":[105],"path":[106],"show":[107],"no":[108],"noticeable":[109],"changes":[110],"PIT":[112,141],"or":[113,121],"behavior,":[115],"regardless":[116],"whether":[118],"it's":[119],"CIFA.":[122],"Interestingly,":[123],"coordination":[124],"among":[125],"attackers":[126],"doesn't":[127],"fundamentally":[128],"change":[129],"how":[130],"resources":[131],"exhausted.":[133],"This":[134],"suggests":[135],"lightweight,":[137],"topology-aware":[138],"defenses\u2014like":[139],"monitoring":[140],"dynamics":[144],"to":[145],"suspicious":[147],"traffic\u2014can":[148],"effectively":[149],"protect":[150],"NDN":[151],"deployments":[152],"without":[153],"heavy":[154],"overhead.":[155]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
