RADD: A Real-time and Accurate Method for DDoS Detection Based on In-Network Computing

被引:0
|
作者
Wang, Wen [1 ,2 ]
Zhu, Shuyong [1 ]
Wu, Zhiyuan [1 ,2 ]
Lu, Lu [3 ]
Li, Zhiqiang [3 ]
Yang, Hongwei [3 ]
Zhang, Yujun [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
[3] China Mobile Res Inst, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
DDoS detection; in-network computing; programmable switch; P4;
D O I
10.1109/ICC51166.2024.10622656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial-of-Service (DDoS) attacks pose formidable threats to the security and availability of critical Internet infrastructure. In-network computing technology brings new opportunities to address DDoS attacks due to its intrinsic data plane programmability and high performance. However, existing DDoS attacks detection schemes based on in-network computing are difficult to strike a balance between true positive rate and false positive rate, especially in low-rate DDoS attacks scenarios. In response to this challenge, we propose RADD, an entropy-based method to detect DDoS attacks in real time based on in-network computing. RADD measures the distribution of network traffic from the perspective of individual IP address to discern subtle fluctuations within network traffic, hence providing early indications of potential DDoS attacks. We implement a prototype of RADD over programmable switches and results show that our proposed method significantly outperforms the state-of-the-art or has equivalent accuracy in low-rate and high-rate DDoS attacks scenarios.
引用
收藏
页码:3316 / 3321
页数:6
相关论文
共 50 条
  • [31] Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing
    Bamasag O.
    Alsaeedi A.
    Munshi A.
    Alghazzawi D.
    Alshehri S.
    Jamjoom A.
    PeerJ Computer Science, 2022, 7
  • [32] Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing
    Bamasag, Omaimah
    Alsaeedi, Alaa
    Munshi, Asmaa
    Alghazzawi, Daniyal
    Alshehri, Suhair
    Jamjoom, Arwa
    PEERJ COMPUTER SCIENCE, 2022, 7
  • [33] In-network Real-time Performance Monitoring with Distributed Event Processing
    Miyazawa, Masanori
    Hayashi, Michiaki
    2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [34] Sliding-Mode Observers for Real-Time DDoS Detection
    Han, Fengling
    Xu, Long
    Yu, Xinghuo
    Tari, Zahir
    Feng, Yong
    Hu, Jiankun
    PROCEEDINGS OF THE 2016 IEEE 11TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2016, : 825 - 830
  • [35] Superpixel attention guided network for accurate and real-time salient object detection
    Zhou, Zhiheng
    Guo, Yongfan
    Huang, Junchu
    Dai, Ming
    Deng, Ming
    Yu, Qingjun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 38921 - 38944
  • [36] Superpixel attention guided network for accurate and real-time salient object detection
    Zhiheng Zhou
    Yongfan Guo
    Junchu Huang
    Ming Dai
    Ming Deng
    Qingjun Yu
    Multimedia Tools and Applications, 2022, 81 : 38921 - 38944
  • [37] Signal Processing Based Method for Real-Time Anomaly Detection in High-Performance Computing
    Dey, ArwIavo
    Islam, Tanzima
    Phelps, Chase
    Kelly, Christopher
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 233 - 240
  • [38] Research on Real-Time Flow Abnormal Traffic Detection System Based on DDoS Attack
    Yue, Xin
    Mo, Xiuliang
    Wang, Chundong
    Yao, Xin
    RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 206 - 212
  • [39] A Real-Time Face Detection Method Based on Blink Detection
    Qi, Hui
    Wu, Chenxu
    Shi, Ying
    Qi, Xiaobo
    Duan, Kaige
    Wang, Xiaobin
    IEEE ACCESS, 2023, 11 : 28180 - 28189
  • [40] Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches
    Wu, Jiahao
    Pan, Heng
    Cui, Penglai
    Huang, Yiwen
    Zhou, Jianer
    He, Peng
    Li, Yanbiao
    Li, Zhenyu
    Xie, Gaogang
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 187 - 207