PEDDA: Practical and Effective Detection of Distributed Attacks on enterprise networks via progressive multi-stage inference

Network attacks on enterprises are distributed in sources and versatile in patterns. However, practical solutions (firewalls) often focus on potential enterprise victims by way of coarse-grained monitoring due to their limited compute resources; thus, ineffective in detecting distributed sources and...

Full description

Saved in:
Bibliographic Details
Published inComputer networks (Amsterdam, Netherlands : 1999) Vol. 233; p. 109873
Main Authors Lyu, Minzhao, Habibi Gharakheili, Hassan, Sivaraman, Vijay
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.09.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Network attacks on enterprises are distributed in sources and versatile in patterns. However, practical solutions (firewalls) often focus on potential enterprise victims by way of coarse-grained monitoring due to their limited compute resources; thus, ineffective in detecting distributed sources and flows of network attacks. In contrast, fine-grained flow-level detection methods are impractical in handling millions of flows for large enterprises. We present PEDDA, a progressive multi-stage inference method to detect distributed attacks by leveraging dynamic controls of programmable networks. It flexibly applies inference stages, each with an orchestratable granularity, whereby packet streams are either proactively or reactively partitioned and analysed by specialised functions depending on the evolution of attacks. The granularity of each stage/function is dynamically determined by an optimisation framework subject to computing resource constraints. We prototype a proof-of-concept system consisting of three inference stages that monitors active enterprise hosts, detects and isolates those victims under attacks, and differentiates distributed sources and flows from benign ones, respectively. We evaluate the efficacy of our prototype by applying it to real traffic traces from a large enterprise network injected by DDoS attacks from a public dataset.
ISSN:1389-1286
1872-7069
DOI:10.1016/j.comnet.2023.109873