Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks

09/19/2018
by   Liehuang Zhu, et al.
0

Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple network domains. Thus, a cross-domain attack detection has been proposed to improve detection performance. However, when participating in detection, the domain of each SDN needs to provide a large amount of real traffic data, from which private information may be leaked. Existing multiparty privacy protection schemes often achieve privacy guarantees by sacrificing accuracy or increasing the time cost. Achieving both high accuracy and reasonable time consumption is a challenging task. In this paper, we propose Predis, which is a privacypreserving cross-domain attack detection scheme for SDNs. Predis combines perturbation encryption and data encryption to protect privacy and employs a computationally simple and efficient algorithm k-Nearest Neighbors (kNN) as its detection algorithm. We also improve kNN to achieve better efficiency. Via theoretical analysis and extensive simulations, we demonstrate that Predis is capable of achieving efficient and accurate attack detection while securing sensitive information of each domain.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/11/2023

PPGenCDR: A Stable and Robust Framework for Privacy-Preserving Cross-Domain Recommendation

Privacy-preserving cross-domain recommendation (PPCDR) refers to preserv...
research
06/25/2018

Prelude: Ensuring Inter-Domain Loop-Freedom in SDN-Enabled Networks

Software-Defined-eXchanges (SDXes) promise to tackle the timely quest of...
research
11/22/2020

Cross-Domain Generalization Through Memorization: A Study of Nearest Neighbors in Neural Duplicate Question Detection

Duplicate question detection (DQD) is important to increase efficiency o...
research
10/13/2020

Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks

Various visual information protection methods have been proposed for pri...
research
10/01/2019

VPN0: A Privacy-Preserving Decentralized Virtual Private Network

Distributed Virtual Private Networks (dVPNs) are new VPN solutions aimin...
research
08/17/2022

Evaluating the Feasibility of a Provably Secure Privacy-Preserving Entity Resolution Adaptation of PPJoin using Homomorphic Encryption

Entity resolution is the task of disambiguating records that refer to th...
research
09/13/2023

Topology-inspired Cross-domain Network for Developmental Cervical Stenosis Quantification

Developmental Canal Stenosis (DCS) quantification is crucial in cervical...

Please sign up or login with your details

Forgot password? Click here to reset