Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network

被引:53
作者
Cao, Yongyi [1 ]
Jiang, Hao [1 ]
Deng, Yuchuan [1 ]
Wu, Jing [1 ]
Zhou, Pan [2 ]
Luo, Wei [3 ]
机构
[1] Wuhan Univ, Elect Informat Sch, Wuhan 430072, Hubei, Peoples R China
[2] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Hubei, Peoples R China
[3] China Ship Dev & Design Ctr, Wuhan 430064, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Denial-of-service attack; Computer crime; Whitelists; Telemetry; Feature extraction; Distributed databases; Delays; DDoS; data plane programmable SDN; in-band network telemetry; spatial-temporal graph convolutional network; DEFENSE;
D O I
10.1109/TDSC.2021.3108782
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of data plane programmable Software-Defined Networking (SDN), Distributed Denial of Service (DDoS) attacks on the data plane increasingly become fatal. Currently, traditional attack detection methods are mainly used to detect whether a DDoS attack occurs and it is difficult to find the path that the attack flow traverses the network, which makes it difficult to accurately mitigate DDoS attacks. In this article, we propose a detection method based on Spatial-Temporal Graph Convolutional Network (ST-GCN) over the data plane programmable SDN, which maps the network into a graph. It senses the state of switches through In-band Network Telemetry (INT) with sampling, inputs the network state into the spatial-temporal graph convolutional network detection model, and finally finds out the switches through which DDoS attack flows pass. Based on this, we propose a defense method combined with an enhanced whitelist and a precise dropping strategy, which can effectively mitigate DDoS attacks and minimize the impact on legitimate network traffic. The evaluation results show that our detection method can accurately detect the path that the DDoS attack flows pass through, and can effectively mitigate the DDoS attack. Compared to classic methods, our method improves the detection accuracy by nearly 10%. At the same time, the southbound interface load and CPU overhead brought by our detection and defense process are much lower than the classic methods.
引用
收藏
页码:3855 / 3872
页数:18
相关论文
共 69 条
[1]  
[Anonymous], 2020, CAIDA UCSD ANONYMIZE
[2]  
Arboleda N, 2020, AWS HIT DDOS ATTACK
[3]  
Bai L, 2019, ARXIV
[4]   DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions [J].
Bawany, Narmeen Zakaria ;
Shamsi, Jawwad A. ;
Salah, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :425-441
[5]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[6]  
Bruna J, 2014, Arxiv, DOI arXiv:1312.6203
[7]  
Cao Y., 2019, PROC INT C SMART COM, P231
[8]  
Chen KY, 2016, IEEE CONF COMM NETW, P28, DOI 10.1109/CNS.2016.7860467
[9]  
Cimpanu C, 2020, MACOS SYSTEMS ABUSED
[10]  
Conti M., 2017, PROC IEEE C NETW FUN, P1