Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunications networks: detecting and counteracting them is still a crucial unresolved challenge for network operators. DDoS attack detection is usually carried out in one or more central nodes that collect significant amounts of monitoring data from networking devices, potentially creating issues related to network overload or delay in detection. The dawn of programmable data planes in Software-Defined Networks can help mitigate this issue, opening the door to the detection of DDoS attacks directly in the data plane of the switches. However, the most widely-adopted data plane programming language, namely P4, lacks supporting many arithmetic operations, therefore, some of the advanced network monitoring functionalities needed for DDoS detection cannot be straightforwardly implemented in P4. This work overcomes such a limitation and presents two novel strategies for flow cardinality and for normalized network traffic entropy estimation that only use P4-supported operations and guarantee a low relative error. Additionally, based on these contributions, we propose a DDoS detection strategy relying on variations of the normalized network traffic entropy. Results show that it has comparable or higher detection accuracy than state-of-the-art solutions, yet being simpler and entirely executed in the data plane.
翻译:对现代电信网络的威胁是长期存在的:发现和打击DDoS攻击对网络操作者来说仍然是一个至关重要的未决问题。 DDoS攻击探测通常是在一个或多个中央节点中进行的,这些节点从网络装置中收集了大量监测数据,可能会造成网络超载或延迟探测问题。软件定义网络中可编程数据机的出现有助于缓解这一问题,打开在开关数据平面直接探测DDoS攻击的大门。然而,最广泛采用的数据平面程序制作语言,即P4缺乏许多计算操作的支持,因此,在P4中无法直接执行DDoS探测所需的一些先进的网络监测功能。这项工作克服了这种局限性,提出了两种新的战略,即流动基点和标准化网络流量导流估计,即只使用P4支持的操作,保证相对差错不大。此外,我们根据这些贡献,提议DDoS探测战略,依靠标准化网络传输母体的变异,即P4,结果显示,其执行的准确性完全可比或更高。