Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunications networks: detecting and counteracting them is still a crucial unresolved challenge for network operators. DDoS attack detection is usually carried out in one or more central nodes that collect significant amounts of monitoring data from networking devices, potentially creating issues related to network overload or delay in detection. The dawn of programmable data planes in Software-Defined Networks can help mitigate this issue, opening the door to the detection of DDoS attacks directly in the data plane of the switches. However, the most widely-adopted data plane programming language, namely P4, lacks supporting many arithmetic operations, therefore, some of the advanced network monitoring functionalities needed for DDoS detection cannot be straightforwardly implemented in P4. This work overcomes such a limitation and presents two novel strategies for flow cardinality and for normalized network traffic entropy estimation that only use P4-supported operations and guarantee a low relative error. Additionally, based on these contributions, we propose a DDoS detection strategy relying on variations of the normalized network traffic entropy. Results show that it has comparable or higher detection accuracy than state-of-the-art solutions, yet being simpler and entirely executed in the data plane.

Ding, D., Savi, M., Siracusa, D. (2022). Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19(6), 4019-4031 [10.1109/TDSC.2021.3116345].

Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4

Savi, Marco;
2022

Abstract

Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunications networks: detecting and counteracting them is still a crucial unresolved challenge for network operators. DDoS attack detection is usually carried out in one or more central nodes that collect significant amounts of monitoring data from networking devices, potentially creating issues related to network overload or delay in detection. The dawn of programmable data planes in Software-Defined Networks can help mitigate this issue, opening the door to the detection of DDoS attacks directly in the data plane of the switches. However, the most widely-adopted data plane programming language, namely P4, lacks supporting many arithmetic operations, therefore, some of the advanced network monitoring functionalities needed for DDoS detection cannot be straightforwardly implemented in P4. This work overcomes such a limitation and presents two novel strategies for flow cardinality and for normalized network traffic entropy estimation that only use P4-supported operations and guarantee a low relative error. Additionally, based on these contributions, we propose a DDoS detection strategy relying on variations of the normalized network traffic entropy. Results show that it has comparable or higher detection accuracy than state-of-the-art solutions, yet being simpler and entirely executed in the data plane.
Articolo in rivista - Articolo scientifico
Computer crime; DDoS detection; Denial-of-service attack; Entropy; Estimation; Hamming weight; Monitoring; Network monitoring; Normalized network traffic entropy; P4; Pipelines; Programmable data planes;
English
29-set-2021
2022
19
6
4019
4031
9552474
open
Ding, D., Savi, M., Siracusa, D. (2022). Tracking Normalized Network Traffic Entropy to Detect DDoS Attacks in P4. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19(6), 4019-4031 [10.1109/TDSC.2021.3116345].
File in questo prodotto:
File Dimensione Formato  
2021_TDSC_Entropy-based_DDoS_Detection.pdf

accesso aperto

Tipologia di allegato: Author’s Accepted Manuscript, AAM (Post-print)
Licenza: Tutti i diritti riservati
Dimensione 6.59 MB
Formato Adobe PDF
6.59 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10281/329245
Citazioni
  • Scopus 20
  • ???jsp.display-item.citation.isi??? 17
Social impact