IEEE INFOCOM 2023 - IEEE Conference on Computer Communications 2023
DOI: 10.1109/infocom53939.2023.10229100
|View full text |Cite
|
Sign up to set email alerts
|

Flowrest: Practical Flow-Level Inference in Programmable Switches with Random Forests

Aristide Tanyi-Jong Akem,
Michele Gucciardo,
Marco Fiore
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 33 publications
(50 reference statements)
0
0
0
Order By: Relevance
“…The communications between multiple actors deployed at different planes introduced by approaches such as those above ultimately translates into network overhead and delays that may significantly curb a fast response to attacks. Hence, we propose to reduce the latency in attack detection and response by exploiting the recent advancements in in-switch inference [14]- [20] to perform those tasks directly in the user plane. Figure 1 also illustrates how our framework would perform the separation of benign and malicious traffic directly in the switch, leaving to the controller the only task of modifying the security policies after the attack has been detected.…”
Section: Securing the Metaverse At Line Ratementioning
confidence: 99%
See 3 more Smart Citations
“…The communications between multiple actors deployed at different planes introduced by approaches such as those above ultimately translates into network overhead and delays that may significantly curb a fast response to attacks. Hence, we propose to reduce the latency in attack detection and response by exploiting the recent advancements in in-switch inference [14]- [20] to perform those tasks directly in the user plane. Figure 1 also illustrates how our framework would perform the separation of benign and malicious traffic directly in the switch, leaving to the controller the only task of modifying the security policies after the attack has been detected.…”
Section: Securing the Metaverse At Line Ratementioning
confidence: 99%
“…We employ the Scikit-Learn libraries [21] to train Random Forest (RF) models on historical traffic measured in the target network and provided in the form of packet capture (pcap) files. We opt for RF models as they have been repeatedly proven to suit well the architecture of programmable switches [14]- [20].…”
Section: Practical Implementationmentioning
confidence: 99%
See 2 more Smart Citations