NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406299
|View full text |Cite
|
Sign up to set email alerts
|

Detecting DDoS attacks within milliseconds by using FPGA-based hardware acceleration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…Compared to commodity accelerators and co-processors, systems built with FPGA provide the best trade-off between flexibility and computing power, thus gaining much attention in recent years. Nagy et al [28] implement an FPGA-based DDoS detector consisting of a traffic parsing unit and a behavioral detection unit. Baker et al [4] present an FPGA-based IDS to support complex rules with correlated-content constructions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared to commodity accelerators and co-processors, systems built with FPGA provide the best trade-off between flexibility and computing power, thus gaining much attention in recent years. Nagy et al [28] implement an FPGA-based DDoS detector consisting of a traffic parsing unit and a behavioral detection unit. Baker et al [4] present an FPGA-based IDS to support complex rules with correlated-content constructions.…”
Section: Related Workmentioning
confidence: 99%
“…• Single-task acceleration: Most existing hardware solutions have focused on accelerating only a specific functionality [4,7,28] , particularly the time-consuming regular expression pattern matching. However, it has been shown that even with an infinitely-fast accelerator, single-task acceleration could not achieve desired throughput speedup over the CPU-based software solution nor support the 100Gbps line rate in a single server footprint [46].…”
Section: Introductionmentioning
confidence: 99%
“…Higher latency means the solution takes an unusual amount of time to detect traffic changes and employ means to mitigate an ongoing attack. In general, solutions should attempt to reduce attack detection/mitigation latency to minimize the adverse effects of the attack 121,160 . That latency is often closely related to how a detection/mitigation technique is enforced.…”
Section: Challenges and Shortcomingsmentioning
confidence: 99%
“…The investigations that fall in the intermediate perspective 59,78,103,121,126,156 typically assume a deployment at the network edge, before traffic enters the victim's network. Lapolli et al 142 .…”
Section: Solutions Focused On the Data Planementioning
confidence: 99%
See 1 more Smart Citation