Toward Continuous Threat Defense: in-Network Traffic Analysis for IoT Gateways

被引:8
作者
Zang, Mingyuan [1 ]
Zheng, Changgang [2 ]
Dittmann, Lars [1 ]
Zilberman, Noa
机构
[1] Tech Univ Denmark, Dept Elect & Photon Engn, DK-2800 Lyngby, Denmark
[2] Univ Oxford, Dept Engn Sci, Oxford OX1 2JD, England
关键词
Runtime; Image edge detection; Telecommunication traffic; Logic gates; Ultra reliable low latency communication; Traffic control; Feature extraction; In-network computing; Internet of Things; machine learning (ML); P4; security;
D O I
10.1109/JIOT.2023.3323771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of IoT devices has unveiled overlooked security risks. With the advent of ultrareliable low-latency communications (URLLCs) in 5G, fast threat defense is critical to minimize damage from attacks. IoT gateways, equipped with wireless/wired interfaces, serve as vital frontline defense against emerging threats on IoT edge. However, current gateways struggle with dynamic IoT traffic and have limited defense capabilities against attacks with changing patterns. In-network computing offers fast machine learning (ML)-based attack detection and mitigation within network devices, but leveraging its capability in IoT gateways requires new continuous learning capability and runtime model updates. In this work, we present P4Pir, a novel in-network traffic analysis framework for IoT gateways. P4Pir incorporates programmable data plane into IoT gateway, pioneering the utilization of in-network ML inference for fast mitigation. It facilitates continuous and seamless updates of in-network inference models within gateways. P4Pir is prototyped in P4 language on raspberry pi and Dell Edge Gateway. With ML inference offloaded to gateway's data plane, P4Pir's in-network approach achieves swift attack mitigation and lightweight deployment compared to prior ML-based solutions. Evaluation results using three public data sets show that P4Pir accurately detects and fastly mitigates emerging attacks (>30% accuracy improvement and submillisecond mitigation time). The proposed model updates method allows seamless runtime updates without disrupting network traffic.
引用
收藏
页码:9244 / 9257
页数:14
相关论文
共 56 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Aggregate-Based Congestion Control for Pulse-Wave DDoS Defense [J].
Alcoz, Albert Gran ;
Strohmeier, Martin ;
Lenders, Vincent ;
Vanbever, Laurent .
SIGCOMM '22: PROCEEDINGS OF THE 2022 ACM SIGCOMM 2022 CONFERENCE, 2022, :693-706
[3]  
[Anonymous], 2021, 3GPP Standard TS 22.261
[4]   Achieving Low Latency Communications in Smart Industrial Networks with Programmable Data Planes [J].
Atutxa, Asier ;
Franco, David ;
Sasiain, Jorge ;
Astorga, Jasone ;
Jacob, Eduardo .
SENSORS, 2021, 21 (15)
[5]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[6]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[7]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[8]  
Busse-Grawitz C., 2022, arXiv
[9]  
DELL Technologies, 2023, Dell EMC Edge Gateway 5200 Software User's Guide
[10]   In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches [J].
Ding, Damu ;
Savi, Marco ;
Pederzolli, Federico ;
Campanella, Mauro ;
Siracusa, Domenico .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :1191-1202