In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches

被引:33
作者
Ding, Damu [1 ,2 ]
Savi, Marco [1 ,3 ]
Pederzolli, Federico [1 ]
Campanella, Mauro [4 ]
Siracusa, Domenico [1 ]
机构
[1] Fdn Bruno Kessler, Ctr Informat & Commun Technol, I-38123 Trento, Italy
[2] Univ Bologna, Dept Elect Elect & Informat Engn, I-40126 Bologna, Italy
[3] Univ Milano Bicocca, Dept Informat Syst & Commun, I-20126 Milan, Italy
[4] GARR, I-00185 Rome, Italy
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
基金
欧盟地平线“2020”;
关键词
Computer crime; Denial-of-service attack; Hash functions; Registers; Monitoring; IP networks; Data structures; Anomaly detection; programmable data planes; DDoS victim identification; P4; FLOWS;
D O I
10.1109/TNSM.2021.3073597
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Volumetric distributed Denial-of-Service (DDoS) attacks have become one of the most significant threats to modern telecommunication networks. However, most existing defense systems require that detection software operates from a centralized monitoring collector, leading to increased traffic load and delayed response. The recent advent of Data Plane Programmability (DPP) enables an alternative solution: threshold-based volumetric DDoS detection can be performed directly in programmable switches to skim only potentially hazardous traffic, to be analyzed in depth at the controller. In this paper, we first introduce the BACON data structure based on sketches, to estimate per-destination flow cardinality, and theoretically analyze it. Then we employ it in a simple in-network DDoS victim identification strategy, INDDoS, to detect the destination IPs for which the number of incoming connections exceeds a pre-defined threshold. We describe its hardware implementation on a Tofino-based programmable switch using the domain-specific P4 language, proving that some limitations imposed by real hardware to safeguard processing speed can be overcome to implement relatively complex packet manipulations. Finally, we present some experimental performance measurements, showing that our programmable switch is able to keep processing packets at line-rate while performing volumetric DDoS detection, and also achieves a high F1 score on DDoS victim identification.
引用
收藏
页码:1191 / 1202
页数:12
相关论文
共 27 条
[1]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[2]  
CAIDA, UCSD ANONYMIZED INTE
[3]  
Cardoso Lapolli Angelo, 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P19
[4]   An improved data stream summary: the count-min sketch and its applications [J].
Cormode, G ;
Muthukrishnan, S .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2005, 55 (01) :58-75
[5]   A Multi-Feature DDoS Detection Schema on P4 Network Hardware [J].
Dimolianis, Marinos ;
Pavlidis, Adam ;
Maglaris, Vasilis .
2020 23RD CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN 2020), 2020, :1-6
[6]  
Ding D., 2020, IEEE IFIP NETW OPER
[7]   An Incrementally-Deployable P4-Enabled Architecture for Network-Wide Heavy-Hitter Detection [J].
Ding, Damu ;
Savi, Marco ;
Antichi, Gianni ;
Siracusa, Domenico .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :75-88
[8]   Bitmap algorithms for counting active flows on high-speed links [J].
Estan, Cristian ;
Varghese, George ;
Fisk, Michael .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2006, 14 (05) :925-937
[9]  
Fayaz SK, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P817
[10]   Combining Open Flow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments [J].
Giotis, K. ;
Argyropoulos, C. ;
Androulidakis, G. ;
Kalogeras, D. ;
Maglaris, V. .
COMPUTER NETWORKS, 2014, 62 :122-136