Erick D. Ramirez-Martinez , Jesús A. Pérez-Díaz , Noe M. Yungaicela-Naula
{"title":"p4 - IoT环境下使用ML和DL辅助Slowloris DDoS攻击检测","authors":"Erick D. Ramirez-Martinez , Jesús A. Pérez-Díaz , Noe M. Yungaicela-Naula","doi":"10.1016/j.comnet.2025.111364","DOIUrl":null,"url":null,"abstract":"<div><div>Distributed denial of service (DDoS) attacks and their more sophisticated slow-rate variants continue to pose a major threat to next-generation networks, such as internet of things (IoT). Due to their limited computational and storage capacities, IoT devices often lack adequate security protections, leaving them vulnerable. Cybercriminals have exploited this problem to create botnets, which are then used to target vital infrastructures. Recent studies have employed Software-Defined Networking (SDN) and machine learning (ML) to autonomously identify slow-rate DDoS attacks. However, because recent works employ a centralized SDN controller, this strategy causes overload as the network size increases. To reduce the workload on the SDN controller, we propose a Programming Protocol-Independent Packet Processors (P4)-based framework that uses ML or deep learning (DL) to detect and mitigate Slowloris DDoS attacks in IoT networks. Our framework employs P4 programmable switches to collect network traffic characteristics and forward them to an intrusion detection system (IDS) for attack detection. We evaluated the framework using Mininet and BMv2 switches, demonstrating that it can detect Slowloris DDoS attacks with up to 98% accuracy using either of the following models: random forest (RF), k-nearest neighbor (KNN), decision tree (DT), long-short-term memory (LSTM) neural network, convolutional neural network (CNN), gated recurrent (GRU) neural network, and multi-layer perceptron (MLP) models. Mitigation is achieved by modifying the match action tables of the switches to block attacker IPs based on IDS results.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"267 ","pages":"Article 111364"},"PeriodicalIF":4.6000,"publicationDate":"2025-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"P4-Assisted Slowloris DDoS attack detection in IoT environments by using ML and DL\",\"authors\":\"Erick D. Ramirez-Martinez , Jesús A. Pérez-Díaz , Noe M. Yungaicela-Naula\",\"doi\":\"10.1016/j.comnet.2025.111364\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Distributed denial of service (DDoS) attacks and their more sophisticated slow-rate variants continue to pose a major threat to next-generation networks, such as internet of things (IoT). Due to their limited computational and storage capacities, IoT devices often lack adequate security protections, leaving them vulnerable. Cybercriminals have exploited this problem to create botnets, which are then used to target vital infrastructures. Recent studies have employed Software-Defined Networking (SDN) and machine learning (ML) to autonomously identify slow-rate DDoS attacks. However, because recent works employ a centralized SDN controller, this strategy causes overload as the network size increases. To reduce the workload on the SDN controller, we propose a Programming Protocol-Independent Packet Processors (P4)-based framework that uses ML or deep learning (DL) to detect and mitigate Slowloris DDoS attacks in IoT networks. Our framework employs P4 programmable switches to collect network traffic characteristics and forward them to an intrusion detection system (IDS) for attack detection. We evaluated the framework using Mininet and BMv2 switches, demonstrating that it can detect Slowloris DDoS attacks with up to 98% accuracy using either of the following models: random forest (RF), k-nearest neighbor (KNN), decision tree (DT), long-short-term memory (LSTM) neural network, convolutional neural network (CNN), gated recurrent (GRU) neural network, and multi-layer perceptron (MLP) models. Mitigation is achieved by modifying the match action tables of the switches to block attacker IPs based on IDS results.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"267 \",\"pages\":\"Article 111364\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625003317\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625003317","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
P4-Assisted Slowloris DDoS attack detection in IoT environments by using ML and DL
Distributed denial of service (DDoS) attacks and their more sophisticated slow-rate variants continue to pose a major threat to next-generation networks, such as internet of things (IoT). Due to their limited computational and storage capacities, IoT devices often lack adequate security protections, leaving them vulnerable. Cybercriminals have exploited this problem to create botnets, which are then used to target vital infrastructures. Recent studies have employed Software-Defined Networking (SDN) and machine learning (ML) to autonomously identify slow-rate DDoS attacks. However, because recent works employ a centralized SDN controller, this strategy causes overload as the network size increases. To reduce the workload on the SDN controller, we propose a Programming Protocol-Independent Packet Processors (P4)-based framework that uses ML or deep learning (DL) to detect and mitigate Slowloris DDoS attacks in IoT networks. Our framework employs P4 programmable switches to collect network traffic characteristics and forward them to an intrusion detection system (IDS) for attack detection. We evaluated the framework using Mininet and BMv2 switches, demonstrating that it can detect Slowloris DDoS attacks with up to 98% accuracy using either of the following models: random forest (RF), k-nearest neighbor (KNN), decision tree (DT), long-short-term memory (LSTM) neural network, convolutional neural network (CNN), gated recurrent (GRU) neural network, and multi-layer perceptron (MLP) models. Mitigation is achieved by modifying the match action tables of the switches to block attacker IPs based on IDS results.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.