iQUIC: An intelligent framework for defending QUIC connection ID-based DoS attack using advantage actor-critic RL

被引:0
作者
Dey, Debasmita [1 ]
Ghosh, Nirnay [1 ]
机构
[1] Indian Inst Engn Sci & Technol, Dept Comp Sci & Technol, Sibpur 711103, Howrah, India
关键词
QUIC; GAN; Advantage actor-critic; Denial of service; Connection-ID attack;
D O I
10.1016/j.cose.2025.104463
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
QUIC (Quick UDP Internet Connections) is a relatively recent transport layer protocol that Google deployed and implemented for the first time in 2012. The key aspect of this protocol is that it is faster than TCP, more secure than UDP, and more efficient regarding resource usage. It has been adopted by some Internet-based applications, viz., YouTube, Gmail, etc. Recent advancements in 5G/6G communication technology have enabled the integration of QUIC with many real-time applications. One of the drawbacks in the design of the QUIC protocol is its vulnerability against attacks related to connection ID, and a recent attack of this type is the retire connection ID stuffing attack. This attack leads to a denial of service (DoS) condition, thus hindering network operations and services. Few preventive solutions have been proposed, but they focus on closing the connection after detecting an attack scenario, which results in service disruption. In this paper, we attempted to render flexibility to this rigid security defense mechanism situation by proposing iQUIC, an intelligent framework to configure a network condition monitoring QUIC server. The framework inputs the network data to a local Advantage Actor-Critic (A2C) Reinforcement Learning (RL) engine to support decision-making regarding accepting/rejecting a request from a client or issuing a warning signal to it. The framework also enables the server to stochastically suspend connections with the client(s) following in epsilon-greedy approach after a predefined observation window. To replicate a real-world QUIC-enabled network, we devised a small QUIC network consisting of two clients and a server and generated substantial QUIC traffic by implementing a U-Net-based GAN (Generative Adversarial Network) model from scratch. A simulation-based performance evaluation demonstrates that the QUIC server powered by the actor-critic RL learns to make optimal decisions with time.
引用
收藏
页数:13
相关论文
共 22 条
[1]  
Balaji Anirudh Srinivas, 2022, INT C SIGN PROC INT, P85
[2]   0-RTT Attack and Defense of QUIC Protocol [J].
Cao, Xudong ;
Zhao, Shangru ;
Zhang, Yuqing .
2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
[3]   A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges [J].
Chaganti, Rajasekhar ;
Boppana, Rajendra, V ;
Ravi, Vinayakumar ;
Munir, Kashif ;
Almutairi, Mubarak ;
Rustam, Furqan ;
Lee, Ernesto ;
Ashraf, Imran .
IEEE ACCESS, 2022, 10 :96538-96555
[4]   Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study [J].
Chatzoglou, Efstratios ;
Kouliaridis, Vasileios ;
Karopoulos, Georgios ;
Kambourakis, Georgios .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) :347-365
[5]  
Cheng A, 2019, 2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), P728, DOI [10.1109/iemcon.2019.8936224, 10.1109/IEMCON.2019.8936224]
[6]   QUIC-EST: A QUIC-Enabled Scheduling and Transmission Scheme to Maximize VoI with Correlated Data Flows [J].
Chiariotti, Federico ;
Deshpande, Anay Ajit ;
Giordani, Marco ;
Antonakoglou, Konstantinos ;
Mahmoodi, Toktam ;
Zanella, Andrea .
IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (04) :30-36
[7]   iTRPL : An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning [J].
Dey, Debasmita ;
Ghosh, Nirnay .
AD HOC NETWORKS, 2024, 163
[8]   Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates [J].
Fischlin, Marc ;
Guenther, Felix .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :60-75
[9]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[10]   Knowledge Enhanced GAN for IoT Traffic Generation [J].
Hui, Shuodi ;
Wang, Huandong ;
Wang, Zhenhua ;
Yang, Xinghao ;
Liu, Zhongjin ;
Jin, Depeng ;
Li, Yong .
PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, :3336-3346