Poster: A Fast Monitor for Slow Network Attacks

被引:0
|
作者
Wei, Cuidi [1 ]
Tu, Shaoyu [2 ]
Hasegawa, Toru [3 ]
Koizumi, Yuki [4 ]
Ramakrishnan, K. K. [2 ]
Takemasa, Junji [4 ]
Wood, Timothy [1 ]
机构
[1] George Washington Univ, Washington, DC 20052 USA
[2] Univ Calif Riverside, Riverside, CA USA
[3] Shimane Univ, Matsue, Shimane, Japan
[4] Osaka Univ, Osaka, Japan
关键词
Traffic monitor; slow network attacks; programmable switches; smartNIC;
D O I
10.1109/Cloud-Summit61220.2024.00032
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recent work has demonstrated how programmable switches can effectively detect attack traffic, such as denial-of-service attacks in the midst of high-volume network traffic. However, these techniques primarily rely on sampling- or sketch-based data structures that can only be used to approximate the characteristics of dominant flows in the network. As a result, such techniques are unable to effectively detect slow attacks such as SYN port scans, SSH brute forcing, or HTTP connection exploits, which do so by stealthily adding only a few packets to the network. In this work we explore how the combination of programmable switches, Smart network interface cards (sNICs), and hosts can enable fine-grained analysis of every flow in a cloud network, even those with only a small number of packets. We focus on analyzing packets at the start of each flow, as those packets often can help indicate whether a flow is benign or suspicious, e.g., by detecting an attack which fails to complete the TCP handshake in order to waste server connection resources. Our approach leverages the high-speed processing of a programmable switch while overcoming its primary limitation - very limited memory capacity - by judiciously sending some state for processing to the sNIC or the host which typically has more memory, but lower bandwidth. Achieving this requires careful design of data structures on the switch, such as a bloom filter and flow logs, and communication protocols between the switch, sNIC, and host, to coordinate state.
引用
收藏
页码:153 / 156
页数:4
相关论文
共 50 条
  • [1] Reactive Network Monitor for DDoS Attacks
    Varalakshmi, P.
    Narayanan, P. Karthik
    Hariharan, M.
    Nagaraj, P.
    Amritha, K.
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 349 - 355
  • [2] Poster: A Framework to Secure IoT Networks Against Network Layer Attacks
    Venkatnarayan, Raghav H.
    Adina, Prasesh
    Mahmood, Shakir
    Shahzad, Muhammad
    2019 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2019,
  • [3] Network Artificial Intelligence, Fast and Slow
    Rossi, Dario
    Zhang, Liang
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON NATIVE NETWORK INTELLIGENCE, NATIVENI 2022, 2022, : 14 - 20
  • [4] Active learning for fast and slow modeling attacks on Arbiter PUFs
    Dumoulin, Vincent
    Rao, Wenjing
    Devroye, Natasha
    2023 26TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN, DSD 2023, 2023, : 260 - 268
  • [5] Poster: Fast Scheduling for Load Migration in Distributed Network Controllers
    Abbasi-Zadeh, Sepehr
    Beiruti, MohmmadAmin
    Ganjali, Yashar
    Hu, Zhenhua
    2020 IEEE 28TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP 2020), 2020,
  • [6] Two radar interferometric approaches to monitor slow and fast land deformation
    Biescas, Erlinda
    Crosetto, Michele
    Agudo, Marta
    Monserrat, Oriol
    Crippa, Bruno
    JOURNAL OF SURVEYING ENGINEERING, 2007, 133 (02) : 66 - 71
  • [7] GraphSTGAN: Situation understanding network of slow-fast high maneuvering targets for maritime monitor services of IoT data
    Wu, Guanlin
    Wang, Haipeng
    Liu, Yu
    He, You
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (03) : 620 - 630
  • [8] GraphSTGAN: Situation understanding network of slow-fast high maneuvering targets for maritime monitor services of IoT data
    Guanlin Wu
    Haipeng Wang
    Yu Liu
    You He
    Digital Communications and Networks, 2024, 10 (03) : 620 - 630
  • [9] Fast detection and visualization of network attacks on parallel coordinates
    Choi, Hyunsang
    Lee, Heejo
    Kim, Hyogon
    COMPUTERS & SECURITY, 2009, 28 (05) : 276 - 288
  • [10] Poster: Longitudinal Analysis of DoS Attacks
    Kaiser, Fabian
    Shulman, Haya
    Waidner, Michael
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3573 - 3575