SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering

被引:10
作者
Dimolianis, Marinos [1 ]
Pavlidis, Adam [1 ]
Maglaris, Vasilis [1 ]
机构
[1] Natl Tech Univ Athens NTUA, Sch Elect & Comp Engn, Network Management & Optimal Design Lab NETMODE, Athens, Greece
来源
2021 24TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN) | 2021年
关键词
SYN Flood; DDoS Detection; DDoS Mitigation; Supervised Learning; XDP; Signatures;
D O I
10.1109/ICIN51074.2021.9385540
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks are widely used by malicious actors to disrupt network infrastructures/services. A common attack is TCP SYN Flood that attempts to exhaust memory and processing resources. Typical mitigation mechanisms, i.e. SYN cookies require significant processing resources and generate large rates of backscatter traffic to block them. In this paper, we propose a detection and mitigation schema that focuses on generating and optimizing signature-based rules. To that end, network traffic is monitored and appropriate packet-level data are processed to form signatures i.e. unique combinations of packet field values. These are fed to machine learning models that classify them to malicious/benign. Malicious signatures corresponding to specific destinations identify potential victims. TCP traffic to victims is redirected to high-performance programmable XDPenabled firewalls that filter off ending traffic according to signatures classified as malicious. To enhance mitigation performance malicious signatures are subjected to a reduction process, formulated as a multi-objective optimization problem. Minimization objectives are (i) the number of malicious signatures and (ii) collateral damage on benign traffic. We evaluate our approach in terms of detection accuracy and packet filtering performance employing traces from production environments and high rate generated attack traffic. We showcase that our approach achieves high detection accuracy, significantly reduces the number of filtering rules and outperforms the SYN cookies mechanism in high-speed traffic scenarios.
引用
收藏
页数:8
相关论文
共 23 条
[1]  
[Anonymous], 2015, ACS SYM SER
[2]  
[Anonymous], 3176 RFC
[3]  
Bernstein D.J., SYN cookies
[4]  
Bertin G, INTRO P0F BPF COMPIL
[5]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[6]  
Cardoso Lapolli Angelo, 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P19
[7]  
Cho K, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, P263
[8]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[9]  
Dimolianis M., 2020, J NETW SYST MANAG
[10]   A Multi-Feature DDoS Detection Schema on P4 Network Hardware [J].
Dimolianis, Marinos ;
Pavlidis, Adam ;
Maglaris, Vasilis .
2020 23RD CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN 2020), 2020, :1-6