Poster: A Fast Monitor for Slow Network Attacks

被引:0
|
作者
Wei, Cuidi [1 ]
Tu, Shaoyu [2 ]
Hasegawa, Toru [3 ]
Koizumi, Yuki [4 ]
Ramakrishnan, K. K. [2 ]
Takemasa, Junji [4 ]
Wood, Timothy [1 ]
机构
[1] George Washington Univ, Washington, DC 20052 USA
[2] Univ Calif Riverside, Riverside, CA USA
[3] Shimane Univ, Matsue, Shimane, Japan
[4] Osaka Univ, Osaka, Japan
关键词
Traffic monitor; slow network attacks; programmable switches; smartNIC;
D O I
10.1109/Cloud-Summit61220.2024.00032
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recent work has demonstrated how programmable switches can effectively detect attack traffic, such as denial-of-service attacks in the midst of high-volume network traffic. However, these techniques primarily rely on sampling- or sketch-based data structures that can only be used to approximate the characteristics of dominant flows in the network. As a result, such techniques are unable to effectively detect slow attacks such as SYN port scans, SSH brute forcing, or HTTP connection exploits, which do so by stealthily adding only a few packets to the network. In this work we explore how the combination of programmable switches, Smart network interface cards (sNICs), and hosts can enable fine-grained analysis of every flow in a cloud network, even those with only a small number of packets. We focus on analyzing packets at the start of each flow, as those packets often can help indicate whether a flow is benign or suspicious, e.g., by detecting an attack which fails to complete the TCP handshake in order to waste server connection resources. Our approach leverages the high-speed processing of a programmable switch while overcoming its primary limitation - very limited memory capacity - by judiciously sending some state for processing to the sNIC or the host which typically has more memory, but lower bandwidth. Achieving this requires careful design of data structures on the switch, such as a bloom filter and flow logs, and communication protocols between the switch, sNIC, and host, to coordinate state.
引用
收藏
页码:153 / 156
页数:4
相关论文
共 50 条
  • [21] Fast-slow visual network for action recognition in videos
    Hu, Heng
    Liu, Tongcun
    Feng, Hailin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 26361 - 26379
  • [22] Rate limiting with network monitor approach to counter DDoS attacks in distributed computing environments
    Hwee, Ong Ghim
    Kiat, Koh Wee
    DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, : 89 - 94
  • [23] EEG AS A MONITOR OF CEREBRAL DISTURBANCE DURING FAST AND SLOW HAEMODIALYSIS OF PATIENTS IN CHRONIC RENAL FAILURE
    KERR, DNS
    OSSELTON, JW
    ELECTROENCEPHALOGRAPHY AND CLINICAL NEUROPHYSIOLOGY, 1967, 23 (05): : 488 - &
  • [24] Poster: Membership Inference Attacks via Contrastive Learning
    Chen, Depeng
    Liu, Xiao
    Cui, Jie
    Zhong, Hong
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3555 - 3557
  • [25] POSTER: How Distributed Are Today's DDoS Attacks?
    Wang, An
    Chang, Wentao
    Mohaisen, Aziz
    Chen, Songqin
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1511 - 1513
  • [26] Fast or slow?
    Sarah Seton-Rogers
    Nature Reviews Cancer, 2016, 16 : 755 - 755
  • [27] Poster: Off-path Attacks Against PKI
    Dai, Tianxiang
    Shulman, Haya
    Waidner, Michael
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2213 - 2215
  • [28] Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis
    Chen, Li Ming
    Hsiao, Shun-Wen
    Chen, Meng Chang
    Liao, Wanjiun
    IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1326 - 1337
  • [29] POSTER: Inference Attacks against Searchable Encryption Protocols
    Islam, Mohammad Saiful
    Kuzu, Mehmet
    Kantarcioglu, Murat
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 845 - 847
  • [30] Poster Abstract: An Experimental Study of Attacks on the Availability of Glossy
    Hewage, Kasun
    Voigt, Thiemo
    REAL-WORLD WIRELESS SENSOR NETWORKS, REALWSN 2013, 2014, 281 : 103 - 107