Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation

被引:31
|
作者
Ilha, Alexandre da Silveira [1 ]
Lapolli, Angelo Cardoso [1 ]
Marques, Jonatas Adilson [1 ]
Gaspary, Luciano Paschoal [1 ]
机构
[1] Univ Fed Rio Grande do Sul, Inst Informat, BR-91501970 Porto Alegre, RS, Brazil
基金
美国国家科学基金会; 巴西圣保罗研究基金会;
关键词
Denial-of-service attack; Switches; Security; Middleboxes; Memory management; Delays; Computer crime; Software-defined networks; security; prototype implementation; testbed experimentation; SKETCH;
D O I
10.1109/TNSM.2020.3048265
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial-of-Service (DDoS) attacks have been steadily escalating in frequency, scale, and disruptiveness-with outbreaks reaching multiple terabits per second and compromising the availability of highly-resilient networked systems. Existing defenses require frequent interaction between forwarding and control planes, making it difficult to reach a satisfactory trade-off between accuracy (higher is better), resource usage, and defense response delay (lower is better). Recently, high-performance programmable data planes have made it possible to develop a new generation of mechanisms to analyze and manage traffic at line rate. In this article, we explore P4 language constructs and primitives to design Euclid, a fully in-network fine-grained, low-footprint, and low-delay traffic analysis mechanism for DDoS attack detection and mitigation. Euclid utilizes information-theoretic and statistical analysis to detect attacks and classify packets as either legitimate or malicious, thus enabling the enforcement of policies (e.g., discarding, inspection, or throttling) to prevent attack traffic from disrupting the operation of its victims. We experimentally evaluate our proposed mechanism using packet traces from CAIDA. The results indicate that Euclid can detect attacks with high accuracy (98.2%) and low delay (approximate to 250 ms), and correctly identify most of the attack packets (>96%) without affecting more than 1% of the legitimate traffic. Furthermore, our approach operates under a small resource usage footprint (tens of kilobytes of static random-access memory per 1 Gbps link and a few hundred ternary content-addressable memory entries), thus enabling its deployability on high-throughput, high-volume scenarios.
引用
收藏
页码:3121 / 3139
页数:19
相关论文
共 50 条
  • [41] A neural network approach for the real-time detection of faults
    Chetouani, Yahya
    STOCHASTIC ENVIRONMENTAL RESEARCH AND RISK ASSESSMENT, 2008, 22 (03) : 339 - 349
  • [42] A Time-Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN
    Bhayo, Jalal
    Jafaq, Riaz
    Ahmed, Awais
    Hameed, Sufian
    Shah, Syed Attique
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3612 - 3630
  • [43] Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing
    Bamasag O.
    Alsaeedi A.
    Munshi A.
    Alghazzawi D.
    Alshehri S.
    Jamjoom A.
    PeerJ Computer Science, 2022, 7
  • [44] Real-Time Detection and Mitigation of Distributed Denial of Service (DDoS) Attacks in Software Defined Networking (SDN)
    Lawal, Babatunde Hafis
    At, Nuray
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [45] Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing
    Bamasag, Omaimah
    Alsaeedi, Alaa
    Munshi, Asmaa
    Alghazzawi, Daniyal
    Alshehri, Suhair
    Jamjoom, Arwa
    PEERJ COMPUTER SCIENCE, 2022, 7
  • [46] Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-Flows
    Lotfalizadeh, Hamidreza
    Kim, Dongso S.
    PROCEEDINGS OF THE 2020 14TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM), 2020,
  • [47] Real-Time Detection of Vehicles and Pedestrians with Novel Region-Based Fully Convolutional Network
    Ge, Dongyuan
    Xiang, Wenjiang
    Zhu, Minling
    Yu, Dongqi
    Lu, Xiaoyi
    Chen, Yueping
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 127 : 122 - 122
  • [48] A real-time Network Intrusion Detection System based on incremental mining approach
    Su, Ming-Yang
    Chang, Kai-Chi
    Wei, Hua-Fu
    Lin, Chun-Yuen
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 179 - +
  • [49] FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream
    Srivastava, Arpita
    Sinha, Ditipriya
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [50] Real-Time Risk Assessment of Network Security Based on Attack Graphs
    Yin, Xiaochuan
    Fang, Yan
    Liu, Yibo
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMPUTER APPLICATIONS (ICSA 2013), 2013, 92 : 75 - 80