Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
144 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Distributing Intelligence in 6G Programmable Data Planes for Effective In-Network Intrusion Prevention (2410.24013v3)

Published 31 Oct 2024 in cs.NI, cs.CR, and math.OC

Abstract: The problem of attacks on new generation network infrastructures is becoming increasingly relevant, given the widening of the attack surface of these networks resulting from the greater number of devices that will access them in the future (sensors, actuators, vehicles, household appliances, etc.). Approaches to the design of intrusion detection systems must evolve and go beyond the traditional concept of perimeter control to build on new paradigms that exploit the typical characteristics of future 5G and 6G networks, such as in-network computing and intelligent programmable data planes. The aim of this research is to propose a disruptive paradigm in which devices in a typical data plane of a future programmable network have anomaly detection capabilities and cooperate in a fully distributed fashion to act as an ML-enabled Intrusion Prevention System ``embedded" into the network. The reported proof-of-concept experiments demonstrate that the proposed paradigm allows working effectively and with a good level of precision while occupying overall less CPU and RAM resources of the devices involved.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. C. Park, K. Park, J. Song, and J. Kim, “Distributed learning-based intrusion detection in 5g and beyond networks,” in Proceedings of the 2023 European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2023, pp. 490–495.
  2. P. Bosshart et al., “P4: Programming protocol-independent packet processors,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, pp. 87–95, 2014.
  3. W. L. da Costa Cordeiro, J. A. Marques, and L. P. Gaspary, “Data plane programmability beyond openflow: Opportunities and challenges for network and service operations and management,” Jour. of Netw Syst Management (2017) 25:784–818, vol. 25, pp. 784–818, 2017.
  4. S. Kianpisheh and T. Taleb, “A survey on in-network computing: Programmable data plane and technology specific applications,” IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 25, no. 1, pp. 701–761, 2023.
  5. D. Moro, G. Verticale, and A. Capone, “Network function decomposition and offloading on heterogeneous networks with programmable data planes,” IEEE Open Journal of the Communications Society, vol. 2, pp. 1874–1885, 2021.
  6. S. Schwarzmann et al., “An intelligent user plane to support in-network computing in 6g networks,” in Proceedings of the IEEE International Conference on Communications (ICC), 2023.
  7. Y. Gao and Z. Wang, “A Review of P4 Programmable Data Planes for Network Security,” Mobile Information Systems., Nov. 2021.
  8. M. Saquetti et al., “Toward in-network intelligence: Running distributed artificial neural networks in the data plane,” IEEE Communications Letters, vol. 25, no. 11, pp. 3551–3555, 2021.
  9. B. M. Xavier, R. S. Guimarães, G. Comarela, and M. Martinello, “Programmable switches for in-networking classification,” in IEEE INFOCOM 2021-IEEE Conference on Computer Communications.   IEEE, 2021, pp. 1–10.
  10. C. Busse-Grawitz et al., “pforest: In-network inference with random forests,” arXiv preprint arXiv:1909.05680, 2019.
  11. C. Zheng et al., “IIsy: Practical In-Network Classification,” arXiv preprint arXiv:2205.08243, 2022.
  12. J.-H. Lee and K. Singh, “SwitchTree: in-network computing and traffic analyses with Random Forests,” Neural Comput. &. Applic., pp. 1–12, Nov. 2020.
  13. G. Zhou, Z. Liu, C. Fu, Q. Li, and K. Xu, “An efficient design of intelligent network data plane,” in 32nd USENIX Security Symposium (USENIX Security 23).   Anaheim, CA: USENIX Association, Aug. 2023, pp. 6203–6220. [Online]. Available: https://www.usenix.org/conference/usenixsecurity23/presentation/zhou-guangmeng
  14. P. Festa, F. Guerriero, M. G. Resende, and E. Scalzo, “A BRKGA with implicit path-relinking for the vehicle routing problem with occasional drivers and time windows,” in Lecture Notes in Computer Science – MIC 2022: 14th Metaheuristics International Conference, forthcoming., 2023.
  15. I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy,” in 2019 International Carnahan Conference on Security Technology (ICCST).   IEEE, 2019, pp. 01–03.

Summary

We haven't generated a summary for this paper yet.