An attacker requests existing or non-existing content in order to overload the distribution infrastructure.
[1] This can be implemented by sending Interest packets, which are not resolved at all or not resolved fast enough, and thus lead to malicious CPU or memory consumption.
[2] This attack was previously denoted an open problem in ICN, only heuristic countermeasures available.
[vague][3] In 2016, Aubrey Alston and Tamer Refaei of The MITRE Corporation presented an exact solution to this problem which utilizes an in-packet cryptographic mechanism to remove the ability of high-volume Interest traffic to overload the distribution infrastructure of the network.
You can help Wikipedia by expanding it.This Internet-related article is a stub.