Denial-of-service attack detection using machine learning in network-on-chip architectures

27Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

State-of-the-art System-on-Chip (SoC) designs consist of many Intellectual Property (IP) cores that interact using a Network-on-Chip (NoC) architecture. SoC designers increasingly rely on global supply chains for obtaining third-party IPs. In addition to inherent vulnerabilities associated with utilizing third-party IPs, NoC based SoCs enable attackers to exploit the distributed nature of NoC and its connectivity with various IPs to launch a plethora of attacks. Specifically, Denial-of-Service (DoS) attacks pose a serious threat in degrading the SoC performance by flooding the NoC with unnecessary packets. In this paper, we present a machine learning-based runtime monitoring mechanism to detect DoS attacks. The models are statically trained and used for runtime attack detection leading to minimum runtime performance overhead. Our approach is capable of detecting DoS attacks with high accuracy, even in the presence of unpredictable NoC traffic patterns caused by various application mappings. We extensively explore machine learning models and features to provide a comprehensive study on how to use machine learning for DoS attack detection in NoC-based SoCs.

Cite

CITATION STYLE

APA

Sudusinghe, C., Charles, S., & Mishra, P. (2021). Denial-of-service attack detection using machine learning in network-on-chip architectures. In Proceedings - 2021 15th IEEE/ACM International Symposium on Networks-on-Chip, NOCS 2021 (pp. 35–40). Association for Computing Machinery, Inc. https://doi.org/10.1145/3479876.3481589

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free