In-Network SYN Flooding DDoS Attack Detection Utilizing P4 Switches

DSpace Repositorium (Manakin basiert)

Zur Kurzanzeige

dc.contributor.author Golchin, Pegah
dc.contributor.author Anderweit, Leonard
dc.contributor.author Zobel, Julian
dc.contributor.author Kundel, Ralf
dc.contributor.author Steinmetz, Ralf
dc.date.accessioned 2022-04-08T07:41:58Z
dc.date.available 2022-04-08T07:41:58Z
dc.date.issued 2022-04-07
dc.identifier.uri http://hdl.handle.net/10900/126078
dc.identifier.uri http://nbn-resolving.de/urn:nbn:de:bsz:21-dspace-1260786 de_DE
dc.identifier.uri http://dx.doi.org/10.15496/publikation-67441
dc.description.abstract With the rapid development of Internet applications, the demand for reliable online services similarly increases. However, Distributed Denial-of-Service (DDoS) attacks disrupt the accessibility and the availability of online services. Therefore, DDoS detection and mitigation are crucial tasks to achieve high service availability. In this paper, we propose a novel in-network detection scheme for SYN flooding, the most prevalent type of DDoS attacks. By relocating the attack detection from a centralized controller to programmable P4 switches, the detection time is reduced, and the workload is distributed in the network. Extending passive classification methods, we propose an active detection mechanism, identifying SYN flooding DDoS attacks by selective packet dropping. By this, we expect more accurate detections compared to the state-of-the-art under congested network conditions. en
dc.language.iso en de_DE
dc.publisher Universität Tübingen de_DE
dc.subject.ddc 004 de_DE
dc.title In-Network SYN Flooding DDoS Attack Detection Utilizing P4 Switches en
dc.type ConferencePaper de_DE
utue.publikation.fachbereich Informatik de_DE
utue.publikation.fakultaet 7 Mathematisch-Naturwissenschaftliche Fakultät de_DE
utue.opus.portal kuvs-nets3 de_DE
utue.publikation.noppn yes de_DE

Dateien:

Das Dokument erscheint in:

Zur Kurzanzeige