BDTM: SDN中LDoS攻击的双向检测和可追溯性缓解

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS
Xiaopu Ma;Xiancong Li;Yingyan He;Qinglei Qi;He Li
{"title":"BDTM: SDN中LDoS攻击的双向检测和可追溯性缓解","authors":"Xiaopu Ma;Xiancong Li;Yingyan He;Qinglei Qi;He Li","doi":"10.1109/TIFS.2025.3584638","DOIUrl":null,"url":null,"abstract":"Although Software-Defined Networking (SDN) introduces architectural innovations, it retains fundamental network properties. As a result, Low-rate Denial of Service (LDoS) attacks, which exploit bottleneck links and TCP congestion control mechanisms, still pose a serious threat to SDN. Currently, to accurately detect LDoS attacks at lower average attack rates, many methods focus on extracting and analyzing single-dimensional features. However, these methods are often complex and offer only limited improvements in detection accuracy. Moreover, critical security vulnerabilities in mainstream mitigation strategies highlight their inability to ensure long-term stability. To this end, we propose BDTM, a cross-dimensional bidirectional detection and traceability mitigation scheme. Through attack parameter estimation with a precision of 0.1s, BDTM achieves precise detection of LDoS attacks that incorporate IP spoofing. In terms of mitigation, we have identified, verified, and resolved critical vulnerabilities in existing mainstream mitigation strategies for the first time. Upon detecting an attack, BDTM rapidly mitigates the ongoing anomaly while performing reverse-flow tracing to pinpoint the attacking host. Ultimately, BDTM enforces port-level isolation targeting the attacker rather than the attack flows, ensuring more effective and comprehensive mitigation. Experimental results demonstrate that BDTM achieves a high detection accuracy of 98.85%, with an average response time of just 5.67s when performing attack traceability.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"6826-6839"},"PeriodicalIF":8.0000,"publicationDate":"2025-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"BDTM: Bidirectional Detection and Traceability Mitigation of LDoS Attacks in SDN\",\"authors\":\"Xiaopu Ma;Xiancong Li;Yingyan He;Qinglei Qi;He Li\",\"doi\":\"10.1109/TIFS.2025.3584638\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although Software-Defined Networking (SDN) introduces architectural innovations, it retains fundamental network properties. As a result, Low-rate Denial of Service (LDoS) attacks, which exploit bottleneck links and TCP congestion control mechanisms, still pose a serious threat to SDN. Currently, to accurately detect LDoS attacks at lower average attack rates, many methods focus on extracting and analyzing single-dimensional features. However, these methods are often complex and offer only limited improvements in detection accuracy. Moreover, critical security vulnerabilities in mainstream mitigation strategies highlight their inability to ensure long-term stability. To this end, we propose BDTM, a cross-dimensional bidirectional detection and traceability mitigation scheme. Through attack parameter estimation with a precision of 0.1s, BDTM achieves precise detection of LDoS attacks that incorporate IP spoofing. In terms of mitigation, we have identified, verified, and resolved critical vulnerabilities in existing mainstream mitigation strategies for the first time. Upon detecting an attack, BDTM rapidly mitigates the ongoing anomaly while performing reverse-flow tracing to pinpoint the attacking host. Ultimately, BDTM enforces port-level isolation targeting the attacker rather than the attack flows, ensuring more effective and comprehensive mitigation. Experimental results demonstrate that BDTM achieves a high detection accuracy of 98.85%, with an average response time of just 5.67s when performing attack traceability.\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"6826-6839\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2025-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11059938/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11059938/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

尽管软件定义网络(SDN)引入了架构创新,但它保留了基本的网络属性。因此,利用瓶颈链路和TCP拥塞控制机制的低速率拒绝服务攻击仍然对SDN构成严重威胁。目前,为了在较低的平均攻击率下准确检测ddos攻击,许多方法都侧重于提取和分析一维特征。然而,这些方法往往是复杂的,只能提供有限的提高检测精度。此外,主流缓解战略中的关键安全漏洞突出表明它们无法确保长期稳定。为此,我们提出了BDTM,一种跨维双向检测和可追溯性缓解方案。通过精度为0.1s的攻击参数估计,BDTM实现了对包含IP欺骗的ddos攻击的精确检测。在缓解方面,我们首次发现、核实并解决了现有主流缓解战略中的关键漏洞。在检测到攻击后,BDTM快速缓解正在进行的异常,同时执行反向流跟踪以精确定位攻击主机。最终,BDTM针对攻击者而不是攻击流实施端口级隔离,从而确保更有效和全面的缓解。实验结果表明,BDTM在进行攻击溯源时,检测准确率高达98.85%,平均响应时间仅为5.67s。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
BDTM: Bidirectional Detection and Traceability Mitigation of LDoS Attacks in SDN
Although Software-Defined Networking (SDN) introduces architectural innovations, it retains fundamental network properties. As a result, Low-rate Denial of Service (LDoS) attacks, which exploit bottleneck links and TCP congestion control mechanisms, still pose a serious threat to SDN. Currently, to accurately detect LDoS attacks at lower average attack rates, many methods focus on extracting and analyzing single-dimensional features. However, these methods are often complex and offer only limited improvements in detection accuracy. Moreover, critical security vulnerabilities in mainstream mitigation strategies highlight their inability to ensure long-term stability. To this end, we propose BDTM, a cross-dimensional bidirectional detection and traceability mitigation scheme. Through attack parameter estimation with a precision of 0.1s, BDTM achieves precise detection of LDoS attacks that incorporate IP spoofing. In terms of mitigation, we have identified, verified, and resolved critical vulnerabilities in existing mainstream mitigation strategies for the first time. Upon detecting an attack, BDTM rapidly mitigates the ongoing anomaly while performing reverse-flow tracing to pinpoint the attacking host. Ultimately, BDTM enforces port-level isolation targeting the attacker rather than the attack flows, ensuring more effective and comprehensive mitigation. Experimental results demonstrate that BDTM achieves a high detection accuracy of 98.85%, with an average response time of just 5.67s when performing attack traceability.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信