{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:45:41Z","timestamp":1774989941836,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,1,21]]},"DOI":"10.1109\/kst67832.2026.11432391","type":"proceedings-article","created":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T19:37:35Z","timestamp":1773862655000},"page":"156-161","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the Impact of Interest Flooding Attacks on Real-World NDN Router Deployments"],"prefix":"10.1109","author":[{"family":"Jupriyadi","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"}]},{"given":"Eueung","family":"Mulyana","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"}]},{"given":"Nana Rachmana","family":"Syambas","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung,Bandung,Indonesia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"issue":"2","key":"ref2","first-page":"1098","article-title":"A Survey on Security and Privacy Issues in Named Data Networking","volume":"25","author":"Muzahid","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref3","first-page":"143","article-title":"Interest Flooding Attack and Countermeasures in Named Data Networking","volume":"151","author":"Grassi","year":"2019","journal-title":"Comput. Netw."},{"issue":"5","key":"ref4","first-page":"3783","article-title":"Cache Pollution Attacks in Information-Centric Networks","volume":"19","author":"Fotiou","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/icwt62080.2024.10674740"},{"issue":"15","key":"ref6","first-page":"13245","article-title":"Machine Learning-Based Detection of Interest Flooding Attacks in NDN","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"ref7","first-page":"2512","article-title":"PIT-Based Adaptive Rate Limiting for Mitigating Interest Flooding Attacks in NDN","volume":"20","author":"Singh","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"ref9","first-page":"175","article-title":"On the Feasibility of Denial-of-Service Attacks in Information-Centric Networks","volume-title":"Proc. ACM ICN","author":"Gasti","year":"2015"},{"issue":"1","key":"ref10","first-page":"789","article-title":"Modeling and Characterizing Content Popularity in Information-Centric Networks","volume":"20","author":"Wang","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref11","article-title":"Deep Reinforcement Learning for Joint PIT and CS Management Under Interest Flooding Attacks","author":"Xie","year":"2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref12","first-page":"1","article-title":"Empirical Analysis of PIT Saturation in Real NDN Routers Under DoS Attacks","volume-title":"Proc. IEEE ICNP","author":"Zhang","year":"2023"},{"issue":"4","key":"ref13","first-page":"1892","article-title":"Evaluating Cache Pollution in Realistic ICN Deployments","volume":"31","author":"Fotiou","year":"2023","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/isriti60336.2023.10467732"},{"key":"ref15","first-page":"2105","article-title":"Topology-Aware Interest Flooding Attack Detection in NDN","volume":"18","author":"Liu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref16","first-page":"103587","article-title":"A Comprehensive Taxonomy of Security Threats in Named Data Networking","volume":"198","author":"Alomari","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"ref17","first-page":"1098","article-title":"Security, Privacy and Trust in ICN\/NDN: A Survey","volume":"25","author":"Gupta","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref18","article-title":"Real-World Evaluation of Interest Flooding Attacks in Edge NDN Deployments","author":"Yu","year":"2025","journal-title":"IEEE Internet Things J., early access"}],"event":{"name":"2026 18th International Conference on Knowledge and Smart Technology (KST)","location":"Pattaya, Thailand","start":{"date-parts":[[2026,1,21]]},"end":{"date-parts":[[2026,1,24]]}},"container-title":["2026 18th International Conference on Knowledge and Smart Technology (KST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11431621\/11431624\/11432391.pdf?arnumber=11432391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:48:32Z","timestamp":1774986512000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11432391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,21]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/kst67832.2026.11432391","relation":{},"subject":[],"published":{"date-parts":[[2026,1,21]]}}}