Multi-step Attack Detection and Mitigation Enhancing In-Network Flow Classification
Recent in-network flow classification methods are able to run within the data plane of network switches allowing intrusion detection at linerate. Although this enables fine-grained, scalable and timely analysis, outcomes are still subject to uncertainty, aggravated by limited data plane resources an...
Saved in:
| Published in | International Conference on Advanced Communication Technologies and Networking (Online) pp. 1 - 10 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
12.12.2022
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2771-7402 |
| DOI | 10.1109/CommNet56067.2022.9993965 |
Cover
| Summary: | Recent in-network flow classification methods are able to run within the data plane of network switches allowing intrusion detection at linerate. Although this enables fine-grained, scalable and timely analysis, outcomes are still subject to uncertainty, aggravated by limited data plane resources and language constraints of respective programs, and hence associated with higher risk of misclassification. Countering these deficiencies by leveraging increased computational capabilities at CPU level of the switches helps to obtain more sophisticated analysis decisions. However, exporting metadata for packet streams from data plane into the network operating system space to run downstream analysis is associated with additional delay and also limited regarding the amount of data that can be shared to ensure scalable processing. To address this trade-off, a certainty-based approach that selectively combines advantages of lower latency and data locality at the data plane with higher computational power and analysis complexity in the operating system is proposed. Therefore, a two-tier flow classification method integrates initial in-network inference on early subflow metadata with advanced decision support provided by a subsequent machine learning-based analysis step. In addition, load and flow monitoring is employed to track long-term and voluminous heavy hitters, supporting a flow detour and throttling mechanism to assist in controlling the volume and velocity of suspicious packet streams. Evaluations show that, first, the cooperative behavior using both traffic classification steps allows for improved accuracies while providing scalable, timely and certain decisions. Second, considered steps to handle potentially malicious heavy hitters allow traffic control to reduce negative impacts on benign flows. |
|---|---|
| ISSN: | 2771-7402 |
| DOI: | 10.1109/CommNet56067.2022.9993965 |