Toward Continuous Threat Defense: in-Network Traffic Analysis for IoT Gateways

被引:8
作者
Zang, Mingyuan [1 ]
Zheng, Changgang [2 ]
Dittmann, Lars [1 ]
Zilberman, Noa
机构
[1] Tech Univ Denmark, Dept Elect & Photon Engn, DK-2800 Lyngby, Denmark
[2] Univ Oxford, Dept Engn Sci, Oxford OX1 2JD, England
关键词
Runtime; Image edge detection; Telecommunication traffic; Logic gates; Ultra reliable low latency communication; Traffic control; Feature extraction; In-network computing; Internet of Things; machine learning (ML); P4; security;
D O I
10.1109/JIOT.2023.3323771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of IoT devices has unveiled overlooked security risks. With the advent of ultrareliable low-latency communications (URLLCs) in 5G, fast threat defense is critical to minimize damage from attacks. IoT gateways, equipped with wireless/wired interfaces, serve as vital frontline defense against emerging threats on IoT edge. However, current gateways struggle with dynamic IoT traffic and have limited defense capabilities against attacks with changing patterns. In-network computing offers fast machine learning (ML)-based attack detection and mitigation within network devices, but leveraging its capability in IoT gateways requires new continuous learning capability and runtime model updates. In this work, we present P4Pir, a novel in-network traffic analysis framework for IoT gateways. P4Pir incorporates programmable data plane into IoT gateway, pioneering the utilization of in-network ML inference for fast mitigation. It facilitates continuous and seamless updates of in-network inference models within gateways. P4Pir is prototyped in P4 language on raspberry pi and Dell Edge Gateway. With ML inference offloaded to gateway's data plane, P4Pir's in-network approach achieves swift attack mitigation and lightweight deployment compared to prior ML-based solutions. Evaluation results using three public data sets show that P4Pir accurately detects and fastly mitigates emerging attacks (>30% accuracy improvement and submillisecond mitigation time). The proposed model updates method allows seamless runtime updates without disrupting network traffic.
引用
收藏
页码:9244 / 9257
页数:14
相关论文
共 56 条
[31]   Industrial IoT in 5G-and-Beyond Networks: Vision, Architecture, and Design Trends [J].
Mahmood, Aamir ;
Beltramelli, Luca ;
Abedin, Sarder Fakhrul ;
Zeb, Shah ;
Mowla, Nishat, I ;
Hassan, Syed Ali ;
Sisinni, Emiliano ;
Gidlund, Mikael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) :4122-4137
[32]  
Mirsky Y, 2018, Arxiv, DOI arXiv:1802.09089
[33]   Machine-learning-assisted DDoS attack detection with P4 language [J].
Musumeci, Francesco ;
Ionata, Valentina ;
Paolucci, Francesco ;
Cugini, Filippo ;
Tornatore, Massimo .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[34]  
Palani K, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS)
[35]   A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions [J].
Parvez, Imtiaz ;
Rahmati, Ali ;
Guvenc, Ismail ;
Sarwat, Arif I. ;
Dai, Huaiyu .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3098-3130
[36]   Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks [J].
Pashamokhtari, Arman ;
Okui, Norihiro ;
Miyake, Yutaka ;
Nakahara, Masataka ;
Gharakheili, Hassan Habibi .
PROCEEDINGS OF THE IEEE 46TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2021), 2021, :57-64
[37]  
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[38]  
Peterson L., 2021, SOFTWARE DEFINED NET
[39]   A Learning Approach with Programmable Data Plane towards IoT Security [J].
Qin, Qiaofeng ;
Poularakis, Konstantinos ;
Tassiulas, Leandros .
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, :410-420
[40]  
Qin QF, 2020, 2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), P352