{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:18:33Z","timestamp":1766269113001,"version":"build-2065373602"},"reference-count":92,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"IRT SystemX"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency of such architecture. Malicious attacks in NDN have become more sophisticated and the foremost challenge is to identify unknown and obfuscated malware, as the malware authors use different evasion techniques for information concealing to prevent detection by an Intrusion Detection System (IDS). For the most part, NDN faces immense negative impacts from attacks such as Cache Pollution Attacks (CPA), Cache Privacy Attacks, Cache Poisoning Attacks, and Interest Flooding Attacks (IFA), that target different security components, including availability, integrity, and confidentiality. This poses a critical challenge to the design of IDS in NDN. This paper provides the latest taxonomy, together with a review of the significant research works on IDSs up to the present time, and a classification of the proposed systems according to the taxonomy. It provides a structured and comprehensive overview of the existing IDSs so that a researcher can create an even better mechanism for the previously mentioned attacks. This paper discusses the limits of the techniques applied to design IDSs with recent findings that can be further exploited in order to optimize those detection and mitigation mechanisms.<\/jats:p>","DOI":"10.3390\/computers11120186","type":"journal-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T01:52:30Z","timestamp":1671069150000},"page":"186","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3060-7183","authenticated-orcid":false,"given":"Abdelhak","family":"Hidouri","sequence":"first","affiliation":[{"name":"Hatem Bettaher IResCoMath Research Lab, University of Gabes, Gabes 6033, Tunisia"},{"name":"National School of Computer Science (ENSI), University of Manouba, Manouba 2011, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9921-3310","authenticated-orcid":false,"given":"Nasreddine","family":"Hajlaoui","sequence":"additional","affiliation":[{"name":"Hatem Bettaher IResCoMath Research Lab, University of Gabes, Gabes 6033, Tunisia"},{"name":"Unit of Scientific Research, Applied College, Qassim University, Unayzah 56435, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8391-3061","authenticated-orcid":false,"given":"Haifa","family":"Touati","sequence":"additional","affiliation":[{"name":"Hatem Bettaher IResCoMath Research Lab, University of Gabes, Gabes 6033, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2294-2237","authenticated-orcid":false,"given":"Mohamed","family":"Hadded","sequence":"additional","affiliation":[{"name":"IRT SystemX, 91120 Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5367-5093","authenticated-orcid":false,"given":"Paul","family":"Muhlethaler","sequence":"additional","affiliation":[{"name":"National Institute for Research in Digital Science and Technology (INRIA), 78150 Paris, France"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Bhowmik, S. (2017). Cloud Computing, Cambridge University Press.","DOI":"10.1017\/9781316941386"},{"key":"ref_2","unstructured":"Barkai, D. (2001, January 27\u201329). Technologies for sharing and collaborating on the Net. Proceedings of the First International Conference on Peer-to-Peer Computing, Link\u00f6ping, Sweden."},{"key":"ref_3","first-page":"7","article-title":"Designing Factors of Distributed Database System: A Review","volume":"12","author":"Velmurugan","year":"2020","journal-title":"Data Min. Knowl. Eng."},{"key":"ref_4","unstructured":"Cheriton, D., and Gritter, M. (2022, December 01). TRIAD: A New Next-Generation Internet Architecture. Available online: http:\/\/www-dsg.stanford.edu\/triad\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/1282427.1282402","article-title":"A data-oriented (and beyond) network architecture","volume":"37","author":"Koponen","year":"2007","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"ref_6","unstructured":"Trossen, D. (2022, December 01). Pursuit Project. Available online: http:\/\/www.fp7-pursuit.eu\/PursuitWeb\/."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/2063176.2063204","article-title":"Networking named content","volume":"55","author":"Jacobson","year":"2012","journal-title":"Commun. ACM"},{"key":"ref_8","unstructured":"Zhang, L., Estrin, D., Burke, J., Jacobson, V., Thornton, J.D., Smetters, D.K., and Papadopoulos, C. (2010). Named Data Networking (NDN) Project, Xerox Palo Alto Research Center-PARC. Relat\u00f3rio T\u00e9cnico NDN-0001."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/COMST.2017.2749508","article-title":"Security, Privacy, and Access Control in Information-Centric Networking: A Survey","volume":"20","author":"Tourani","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1007\/s11390-019-1978-9","article-title":"Security Attacks in Named Data Networking: A Review and Research Directions","volume":"34","author":"Kumar","year":"2019","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_11","first-page":"2904","article-title":"An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction","volume":"14","author":"Im","year":"2020","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.35940\/ijitee.K1258.09811S19","article-title":"Named Data Networking (NDN), Internet Architecture Design and Security Attacks","volume":"8","author":"Arulkumaran","year":"2019","journal-title":"Int. J. Innov. Technol. Explor. Eng."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Benmoussa, A., Kerrache, C.A., Lagraa, N., Mastorakis, S., Lakas, A., and Tahari, A.E.K. (2022). Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements and Future Directions. ACM Comput. Surv.","DOI":"10.1145\/3539730"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lee, R.-T., Leau, Y.-B., Park, Y.J., and Anbar, M. (2021). A Survey of Interest Flooding Attack in Named-Data Networking: Taxonomy, Performance and Future Research Challenges. IETE Tech. Rev., 1\u201319.","DOI":"10.1080\/02564602.2021.1957029"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"19958","DOI":"10.1109\/ACCESS.2022.3151864","article-title":"Hierarchical Naming Scheme in Named Data Networking for Internet of Things: A Review and Future Security Challenges","volume":"10","author":"Shah","year":"2022","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1007\/s10207-022-00591-w","article-title":"A survey on interest packet flooding attacks and its countermeasures in named data networking","volume":"21","author":"Jeet","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ali, Z., Shah, M.A., Almogren, A., Din, I.U., Maple, C., and Khattak, H.A. (2020). Named Data Networking for Efficient IoT-based Disaster Management in a Smart Campus. Sustainability, 12.","DOI":"10.3390\/su12083088"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"75899","DOI":"10.1109\/ACCESS.2018.2882811","article-title":"Leveraging Named Data Networking for Fragmented Networks in Smart Metropolitan Cities","volume":"6","author":"Khan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Quevedo, J., and Corujo, D. (2022). Selective Content Retrieval in Information-Centric Networking. Sensors, 22.","DOI":"10.3390\/s22228742"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"90254","DOI":"10.1109\/ACCESS.2022.3201083","article-title":"Named Data Networking: A Survey on Routing Strategies","volume":"10","author":"Karim","year":"2022","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Mejri, S., Touati, H., Malouch, N., and Kamoun, F. (November, January 30). Hop-by-Hop Congestion Control for Named Data Networks. Proceedings of the 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia.","DOI":"10.1109\/AICCSA.2017.36"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Mejri, S., Touati, H., and Kamoun, F. (2018, January 15\u201318). Hop-by-hop interest rate notification and adjustment in named data networks. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.","DOI":"10.1109\/WCNC.2018.8377374"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1862","DOI":"10.1109\/JSYST.2019.2923841","article-title":"Analyzing NDN NACK on Interest Flooding Attack via SIS Epidemic Model","volume":"14","author":"Wang","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2470","DOI":"10.1109\/TIFS.2019.2899247","article-title":"Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking","volume":"14","author":"Nguyen","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"da Silva, E.T., de Macedo, J.M.H., and Costa, A.L.D. (2022). NDN Content Store and Caching Policies: Performance Evaluation. Computers, 11.","DOI":"10.3390\/computers11030037"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MC.2018.1151010","article-title":"Security Issues in Named Data Networks","volume":"51","author":"Chatterjee","year":"2018","journal-title":"Computer"},{"key":"ref_27","unstructured":"Zhang, Z., Wong, S.Y., Shi, J., Pesavento, D., Afanasyev, A., and Zhang, L. (2020). On Certificate Management in Named Data Networking. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"60570","DOI":"10.1109\/ACCESS.2018.2875890","article-title":"Named Data Networking\u2019s Intrinsic Cyber-Resilience for Vehicular CPS","volume":"6","author":"Bouk","year":"2018","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gasti, P., Tsudik, G., Uzun, E., and Zhang, L. (August, January 30). DoS and DDoS in Named Data Networking. Proceedings of the 2013 22nd International Conference on Computer Communication and Networks (ICCCN), Nassau, Bahamas.","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/COMST.2016.2622240","article-title":"BGP Anomaly Detection Techniques: A Survey","volume":"19","author":"Branch","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"935","DOI":"10.1016\/j.comnet.2007.11.019","article-title":"Pollution attacks and defenses for Internet caching systems","volume":"52","author":"Deng","year":"2008","journal-title":"Comput. Netw."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Hidouri, A., Hadded, M., Hajlaoui, N., Touati, H., and Muhlethaler, P. (2021, January 23\u201325). Cache pollution attacks in the NDN architecture: Impact and analysis. Proceedings of the 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia.","DOI":"10.23919\/SoftCOM52868.2021.9559049"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Buragohain, M., and Nandi, S. (2020). Demystifying security on NDN: A survey of existing attacks and open research challenges. The \u201cEssence\u201d of Network Security: An End-to-End Panorama, Springer.","DOI":"10.1007\/978-981-15-9317-8_10"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"65996","DOI":"10.1109\/ACCESS.2022.3184304","article-title":"Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking","volume":"10","author":"Shatnawi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_35","first-page":"102912","article-title":"I-CIFA: An improved collusive interest flooding attack in named data networking","volume":"61","author":"Wu","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Buragohain, M., Kathar, C.J., Kachari, C., Nandi, S.K., and Nandi, S. (2020, January 16\u201319). SCAN: Smart Collaborative Attack in Named Data Networking. Proceedings of the 2020 IEEE 45th Conference on Local Computer Networks (LCN), Sydney, Australia.","DOI":"10.1109\/LCN48667.2020.9314807"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Lauinger, T., Laoutaris, N., Rodriguez, P., Strufe, T., Biersack, E., and Kirda, E. (2012). Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures, Northeastern University. Technical Report.","DOI":"10.1145\/2378956.2378966"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Dogruluk, E., Costa, A., and Macedo, J. (2018). Identifying previously requested content by side-channel timing attack in NDN. Communications in Computer and Information Science, Springer.","DOI":"10.1007\/978-3-319-94421-0_3"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Losiouk, E., Tsudik, G., and Valle, S. (2020, January 20\u201324). A proactive cache privacy attack on NDN. Proceedings of the NOMS 2020\u20142020 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary.","DOI":"10.1109\/NOMS47738.2020.9110318"},{"key":"ref_40","unstructured":"Xie, M., Widjaja, I., and Wang, H. (2012, January 25\u201330). Enhancing cache robustness for content-centric networking. Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2077","DOI":"10.1109\/TIFS.2016.2574307","article-title":"Exploiting path diversity for thwarting pollution attacks in named data networking","volume":"11","author":"Guo","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Kamimoto, T., Mori, K., Umeda, S., Ohata, Y., and Shigeno, H. (2016, January 9\u201312). Cache protection method based on prefix hierarchy for content-oriented network. Proceedings of the 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2016.7444816"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"19012","DOI":"10.1109\/ACCESS.2017.2754058","article-title":"Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking","volume":"5","author":"Zhang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1109\/TDSC.2018.2876257","article-title":"Detection and defense of cache pollution attacks using clustering in named data networks","volume":"17","author":"Yao","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Hidouri, A., Touati, H., Hadded, M., Hajlaoui, N., and Muhlethaler, P. (2022). A detection mechanism for cache pollution attack in named data network architecture. Advanced Information Networking and Applications, Springer.","DOI":"10.1007\/978-3-030-99584-3_38"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Park, H., Widjaja, I., and Lee, H. (2012, January 10\u201315). Detection of cache pollution attacks using randomness checks. Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6363885"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.comnet.2015.01.020","article-title":"An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking","volume":"80","author":"Karami","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Kumar, N., and Srivast, S. (2021). IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity, Research Square Platform LLC.","DOI":"10.21203\/rs.3.rs-682924\/v1"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1007\/s10723-020-09531-1","article-title":"Blockchain-Based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks","volume":"18","author":"Lei","year":"2020","journal-title":"J. Grid Comput."},{"key":"ref_50","unstructured":"Khanna, A., Gupta, D., P\u00f3lkowski, Z., Bhattacharyya, S., and Castillo, O. (2021). Detection of Cache Pollution Attacks in a Secure Information-Centric Network. Data Analytics and Management, Springer. Lecture Notes on Data Engineering and Communications Technologies."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s12243-018-0669-9","article-title":"Cache nFace: A simple countermeasure for the producer-consumer collusion attack in Named Data Networking","volume":"74","author":"Nasserala","year":"2019","journal-title":"Ann. Telecommun."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Zhou, J., Luo, J., Deng, L., and Wang, J. (2020, January 9\u201311). Cache Pollution Prevention Mechanism Based on Cache Partition in V-NDN. Proceedings of the 2020 IEEE\/CIC International Conference on Communications in China (ICCC), Chongqing, China.","DOI":"10.1109\/ICCC49849.2020.9238838"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s10922-022-09689-x","article-title":"An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking","volume":"31","author":"Li","year":"2023","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Dai, H., Wang, Y., Fan, J., and Liu, B. (2013, January 14\u201319). Mitigate DDoS attacks in NDN by interest traceback. Proceedings of the 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Turin, Italy.","DOI":"10.1109\/INFCOMW.2013.6970722"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Compagno, A., Conti, M., Gasti, P., and Tsudik, G. (2013, January 21\u201324). Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia.","DOI":"10.1109\/LCN.2013.6761300"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1016\/j.neucom.2014.11.003","article-title":"A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking","volume":"151","author":"Karami","year":"2015","journal-title":"Neurocomputing"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1776","DOI":"10.1109\/JSYST.2019.2939371","article-title":"Resist Interest Flooding Attacks via Entropy\u2013SVM and Jensen\u2013Shannon Divergence in Information-Centric Networking","volume":"14","author":"Zhi","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.future.2020.01.043","article-title":"MSIDN: Mitigation of Sophisticated Interest flooding-based DDoS attacks in Named Data Networking","volume":"107","author":"Benmoussa","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10207-020-00500-z","article-title":"ChoKIFA+: An early detection and mitigation approach against interest flooding attacks in NDN","volume":"20","author":"Benarfa","year":"2021","journal-title":"Int. J. Inf. Secur."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1007\/s10922-020-09539-8","article-title":"Detecting and Mitigating DDoS Attack in Named Data Networking","volume":"28","author":"Alhisnawi","year":"2020","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"101971","DOI":"10.1016\/j.cose.2020.101971","article-title":"Mitigation measures of collusive interest flooding attacks in named data networking","volume":"97","author":"Wu","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"128005","DOI":"10.1109\/ACCESS.2020.3008723","article-title":"The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MCOM.001.2000368","article-title":"Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking","volume":"59","author":"Xing","year":"2021","journal-title":"IEEE Commun. Mag."},{"key":"ref_64","first-page":"1812273","article-title":"Attention-Based LSTM model for IFA detection in named data networking","volume":"2022","author":"Zhang","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Wu, Z., Peng, S., Liu, L., and Yue, M. (2022). Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN. IEEE Trans. Netw. Sci. Eng.","DOI":"10.1109\/TNSE.2022.3206581"},{"key":"ref_66","unstructured":"Kim, D., Nam, S., Bi, J., and Yeom, I. (October, January 30). Efficient content verification in named data networking. Proceedings of the 2nd ACM Conference on Information-Centric Networking, San Francisco, CA, USA."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Ghali, C., Tsudik, G., and Uzun, E. (2014, January 23\u201326). Needle in a Haystack: Mitigating content poisoning in named-data networking. Proceedings of the 2014 Workshop on Security of Emerging Networking Technologies, San Diego, CA, USA.","DOI":"10.14722\/sent.2014.23014"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.jnca.2017.12.013","article-title":"A trust-based method for mitigating cache poisoning in Name Data Networking","volume":"104","author":"Rezaeifar","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Konorski, J. (2019, January 27\u201329). Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting. Proceedings of the 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand.","DOI":"10.1109\/ITNAC46935.2019.9077973"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/TMC.2019.2908161","article-title":"Mitigating NDN-Based Fake Content Dissemination in Opportunistic Mobile Networks","volume":"19","author":"Saha","year":"2020","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Baranski, S., and Konorski, J. (2020, January 25\u201327). Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain. Proceedings of the 2020 30th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia.","DOI":"10.1109\/ITNAC50341.2020.9315048"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Singh, J., Kumar, S., and Choudhury, U. (2021). NDN Content Poisoning Attack Mitigation Using Fuzzy-Reputation Based Trust. Innovations in Cyber Physical Systems, Springer. Lecture Notes in Electrical Engineering.","DOI":"10.1007\/978-981-16-4149-7_29"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"40198","DOI":"10.1109\/ACCESS.2021.3063490","article-title":"A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things","volume":"9","author":"Hussain","year":"2021","journal-title":"IEEE Access"},{"key":"ref_74","unstructured":"Sun, X., Zhang, X., Xia, Z., and Bertino, E. (2021). A Caching Strategy Based on Content Popularity Level for NDN. Advances in Artificial Intelligence and Security. ICAIS 2021, Springer. Communications in Computer and Information Science."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"e435","DOI":"10.7717\/peerj-cs.435","article-title":"Detection of malicious consumer interest packet with dynamic threshold values","volume":"7","author":"Qureshi","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Hou, S., Hu, Y., and Tian, L. (2022). Named data network dynamic cache placement strategy based on programmable data plane. IET Netw.","DOI":"10.1049\/ntw2.12067"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/2378956.2378966","article-title":"Privacy risks in Named Data Networking: What is the cost of performance?","volume":"42","author":"Lauinger","year":"2012","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Ntuli, N., and Han, S. (2012, January 15\u201317). Detecting router cache snooping in Named Data Networking. Proceedings of the 2012 International Conference on ICT Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2012.6387155"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Gao, M., Zhu, X., and Su, Y. (2015, January 2\u20134). Protecting router cache privacy in named data networking. Proceedings of the 2015 IEEE\/CIC International Conference on Communications in China (ICCC), Shenzhen, China.","DOI":"10.1109\/ICCChina.2015.7448754"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"174","DOI":"10.2991\/ijndc.2018.6.3.5","article-title":"A triggered delay-based approach against cache privacy attack in NDN","volume":"6","author":"Kumar","year":"2018","journal-title":"Int. J. Netw. Distrib. Comput."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.jnca.2019.07.004","article-title":"NBP: Namespace-based privacy to counter timing-based attack in named data networking","volume":"144","author":"Kumar","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Singh, V.P., and Ujjwal, R.L. (2019). Privacy attack modeling and risk assessment method for name data networking. Advances in Intelligent Systems and Computing, Springer.","DOI":"10.1007\/978-981-13-6861-5_10"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Ko, K.T., Hlaing, H.H., and Mambo, M. (2020). A peks-based NDN strategy for name privacy. Future Internet, 12.","DOI":"10.3390\/fi12080130"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"145803","DOI":"10.1109\/ACCESS.2020.3014898","article-title":"Public key certificate privacy in vondn: Voice over named data networks","volume":"8","author":"Dogruluk","year":"2020","journal-title":"IEEE Access"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/MNET.121.1900574","article-title":"Internet-Scale video streaming over NDN","volume":"35","author":"Ghasemi","year":"2021","journal-title":"IEEE Netw."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Xu, Z., Khan, H., and Muresan, R. (2022, January 12\u201315). TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial Attacks. Proceedings of the 2022 International Conference on Information Networking (ICOIN), Jeju-si, Republic of Korea.","DOI":"10.1109\/ICOIN53446.2022.9687165"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Dogruluk, E., Macedo, J., and Costa, A. (2022). A countermeasure approach for brute-force timing attacks on cache privacy in named data networking architectures. Electronics, 11.","DOI":"10.3390\/electronics11081265"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"75312","DOI":"10.1109\/ACCESS.2022.3178992","article-title":"Blockchain document forwarding and proof method based on NDN network","volume":"10","author":"Kang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"100048","DOI":"10.1016\/j.hcc.2021.100048","article-title":"A survey on blockchain systems: Attacks, defenses, and privacy preservation","volume":"2","author":"Chen","year":"2022","journal-title":"High-Confid. Comput."},{"key":"ref_90","unstructured":"(2022, December 01). NDN Packet Format Specification\u2014NDN Packet Format Specification 0.1 Documentation. (n.d.). Available online: https:\/\/named-data.net\/doc\/NDN-packet-spec\/0.1\/."},{"key":"ref_91","unstructured":"(2022, December 01). NDN Packet Format Specification 0.3. Named-Data.Net. Available online: https:\/\/named-data.net\/doc\/NDN-packet-spec\/current\/."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1942847","DOI":"10.1155\/2022\/1942847","article-title":"Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU","volume":"2022","author":"Cao","year":"2022","journal-title":"Comput. Intell. Neurosci."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/11\/12\/186\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:41:15Z","timestamp":1760146875000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/11\/12\/186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":92,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["computers11120186"],"URL":"https:\/\/doi.org\/10.3390\/computers11120186","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2022,12,14]]}}}