Volumetric distributed Denial-of-Service (DDoS) attacks have become one of the most significant threats to modern telecommunication networks. However, most existing defense systems require that detection software operates from a centralized monitoring collector, leading to increased traffic load and delayed response. The recent advent of Data Plane Programmability (DPP) enables an alternative solution: threshold-based volumetric DDoS detection can be performed directly in programmable switches to skim only potentially hazardous traffic, to be analyzed in depth at the controller. In this paper, we first introduce the BACON data structure based on sketches, to estimate per-destination flow cardinality, and theoretically analyze it. Then we employ it in a simple in-network DDoS victim identification strategy, INDDoS, to detect the destination IPs for which the number of incoming connections exceeds a pre-defined threshold. We describe its hardware implementation on a Tofino-based programmable switch using the domain-specific P4 language, proving that some limitations imposed by real hardware to safeguard processing speed can be overcome to implement relatively complex packet manipulations. Finally, we present some experimental performance measurements, showing that our programmable switch is able to keep processing packets at line-rate while performing volumetric DDoS detection, and also achieves a high F1 score on DDoS victim identification.

Ding, D., Savi, M., Pederzolli, F., Campanella, M., Siracusa, D. (2021). In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 18(2), 1191-1202 [10.1109/TNSM.2021.3073597].

In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches

Savi, Marco;
2021

Abstract

Volumetric distributed Denial-of-Service (DDoS) attacks have become one of the most significant threats to modern telecommunication networks. However, most existing defense systems require that detection software operates from a centralized monitoring collector, leading to increased traffic load and delayed response. The recent advent of Data Plane Programmability (DPP) enables an alternative solution: threshold-based volumetric DDoS detection can be performed directly in programmable switches to skim only potentially hazardous traffic, to be analyzed in depth at the controller. In this paper, we first introduce the BACON data structure based on sketches, to estimate per-destination flow cardinality, and theoretically analyze it. Then we employ it in a simple in-network DDoS victim identification strategy, INDDoS, to detect the destination IPs for which the number of incoming connections exceeds a pre-defined threshold. We describe its hardware implementation on a Tofino-based programmable switch using the domain-specific P4 language, proving that some limitations imposed by real hardware to safeguard processing speed can be overcome to implement relatively complex packet manipulations. Finally, we present some experimental performance measurements, showing that our programmable switch is able to keep processing packets at line-rate while performing volumetric DDoS detection, and also achieves a high F1 score on DDoS victim identification.
Articolo in rivista - Articolo scientifico
Anomaly detection; DDoS victim identification; P4; programmable data planes;
English
15-apr-2021
2021
18
2
1191
1202
9405352
open
Ding, D., Savi, M., Pederzolli, F., Campanella, M., Siracusa, D. (2021). In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 18(2), 1191-1202 [10.1109/TNSM.2021.3073597].
File in questo prodotto:
File Dimensione Formato  
Ding-2021-IEEE Transact Network Service Manag-AAM.pdf

accesso aperto

Descrizione: Article
Tipologia di allegato: Author’s Accepted Manuscript, AAM (Post-print)
Licenza: Altro
Dimensione 487.66 kB
Formato Adobe PDF
487.66 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10281/311404
Citazioni
  • Scopus 32
  • ???jsp.display-item.citation.isi??? 21
Social impact