2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) 2018
DOI: 10.1109/nca.2018.8548136
|View full text |Cite
|
Sign up to set email alerts
|

LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes

Abstract: While there are various methods to detect application layer attacks or intrusion attempts on an individual end host, it is not efficient to provide all end hosts in the network with heavy-duty defense systems or software firewalls. In this work, we leverage a new concept of programmable data planes, to directly react on alerts raised by a victim and prevent further attacks on the whole network by blocking the attack at the network edge. We call our design LAMP, Layer 7 Attack Mitigation with Programmable data … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…DIDA and DroPPPP introduce blacklists to indicate malicious traffic for further dropping. Moreover, in [73], [77], [80], authors also apply the dropping action after parsing the incoming packets and checking them against a blacklist. Similarly, in [72], [75], authors introduce Firewalls that apply dropping to traffic that matches ban lists.…”
Section: ) Droppingmentioning
confidence: 99%
See 2 more Smart Citations
“…DIDA and DroPPPP introduce blacklists to indicate malicious traffic for further dropping. Moreover, in [73], [77], [80], authors also apply the dropping action after parsing the incoming packets and checking them against a blacklist. Similarly, in [72], [75], authors introduce Firewalls that apply dropping to traffic that matches ban lists.…”
Section: ) Droppingmentioning
confidence: 99%
“…For works such as [51], [55], [49], and [63], authors used BMv2 switches to extract relevant traffic features in order to apply detection mechanisms through ML algorithms. Moreover, in P4-based security solutions such as [77], [42], [37], [81], [83], [45], [38] and [58], authors took advantage of BMv2 switches aiming to design a testing environment to evaluate the performance of the corresponding P4 detection and mitigation strategies.…”
Section: ) Bmv2mentioning
confidence: 99%
See 1 more Smart Citation
“…DDoS Attack. Grigoryan et al [67] propose a cooperative mitigation mechanism for DDoS attacks, LAMP (Layer 7 Attack Mitigation with Programmable data planes), which relies on information from the application layer. If a host detects a DDoS attack on the application layer, an attack flag will be padded to the IP option header field of a packet, and the packet will be sent to the ingress switch.…”
Section: Availabilitymentioning
confidence: 99%