BACKORDERS: Using Random Forests to Detect DDoS Attacks in Programmable Data Planes

18Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Networks and the services they support form the communication backbone of our society, and it is important that potential Distributed Denial of Service (DDoS) attacks are detected quickly, in order to avoid or minimize the impact they may have on the availability of services. Recent technological advances in programmable networks - specifically the programmability of data planes in switches and routers, have made available new ways of detecting such attacks. By relying on this newfound possibility, this paper proposes the utilization of a Random Forest (RF) to aid in quickly and accurately detecting DDoS attacks in a programmable switch. Random forests utilize several classification trees, each of them for independently classifying an input as one of a set of classes. Here, each decision tree will classify a network flow as potentially malicious, i.e. part of a DDoS attack, or a legitimate user flow. Despite utilizing multiple classification trees to improve accuracy, random forests are relatively lightweight, with each tree requiring few and simple computations to arrive at a classification. Our results show that even small RFs, requiring as few as 63 match+action table entries, can achieve F1-Scores of over 90%.

Cite

CITATION STYLE

APA

Coelho, B., & Schaeffer-Filho, A. (2022). BACKORDERS: Using Random Forests to Detect DDoS Attacks in Programmable Data Planes. In EuroP4 2022 - Proceedings of the 5th International Workshop on P4 in Europe, Part of CoNEXT 2022 (pp. 1–7). Association for Computing Machinery, Inc. https://doi.org/10.1145/3565475.3569074

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free