GNN4IFA

Interest Flooding Attack Detection With Graph Neural Networks

Conference Paper (2023)
Author(s)

A. Agiollo (University of Bologna)

Enkeleda Bardhi (Sapienza University of Rome)

Mauro Conti (TU Delft - Cyber Security, University of Padua)

Riccardo Lazzeretti (Sapienza University of Rome)

Eleonora Losiouk (University of Padua)

Andrea Omicini (University of Bologna)

Research Group
Cyber Security
Copyright
© 2023 A. Agiollo, Enkeleda Bardhi, M. Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini
DOI related publication
https://doi.org/10.1109/EuroSP57164.2023.00043
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 A. Agiollo, Enkeleda Bardhi, M. Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini
Research Group
Cyber Security
Pages (from-to)
615-630
ISBN (electronic)
978-1-6654-6512-0
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

In the context of Information-Centric Networking, Interest Flooding Attacks (IFAs) represent a new and dangerous sort of distributed denial of service. Since existing proposals targeting IFAs mainly focus on local information, in this paper we propose GNN4IFA as the first mechanism exploiting complex non-local knowledge for IFA detection by leveraging Graph Neural Networks (GNNs) handling the overall network topology.In order to test GNN4IFA, we collect SPOTIFAI, a novel dataset filling the current lack of available IFA datasets by covering a variety of IFA setups, including ~40 heterogeneous scenarios over three network topologies. We show that GNN4IFA performs well on all tested topologies and setups, reaching over 99% detection rate along with a negligible false positive rate and small computational costs. Overall, GNN4IFA overcomes state-of-the-art detection mechanisms both in terms of raw detection and flexibility, and - unlike all previous solutions in the literature - also enables the transfer of its detection on network topologies different from the one used in its design phase.

Files

GNN4IFA_Interest_Flooding_Atta... (pdf)
(pdf | 2.39 Mb)
- Embargo expired in 31-01-2024
License info not available