O’MINE: A Novel Collaborative DDoS Detection Mechanism for Programmable Data-Planes

Conference Paper (2025)
Author(s)

E. Bardhi (TU Delft - Networked Systems)

C. Ji (TU Delft - Networked Systems)

A. Imran (University of Michigan)

M. Shahbaz (University of Michigan)

R. Lazzeretti (Sapienza University of Rome)

Mauro Conti (University of Padua)

FA Kuipers (TU Delft - Networked Systems)

Research Group
Networked Systems
DOI related publication
https://doi.org/10.1109/EuroSP63326.2025.00049
More Info
expand_more
Publication Year
2025
Language
English
Research Group
Networked Systems
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository as part of the Taverne amendment. More information about this copyright law amendment can be found at https://www.openaccess.nl. Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.@en
Pages (from-to)
771-788
ISBN (print)
979-8-3315-9494-7
ISBN (electronic)
979-8-3315-9493-0
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The emergence of softwarized network devices, like programmable switches and smart NICs, has brought about new and advanced network functionalities. Intelligent decision-making becomes possible at line rate by offloading network functionality from the network control-plane to the programmable data-plane. In this paper, we offload fine-grained Distributed Denial of Service (DDoS) attack detection to the data-plane. The state-of-the-art in this regard, mainly aims to embed Machine Learning (ML) models into the data-plane without compromising on inference accuracy. Besides accuracy, we must consider multiple other factors, like traffic feature availability and false positive rates. To that end, we propose O’MINE: ONE MODEL IS NOT ENOUGH, a novel collaborative detection mechanism comprising lightweight ML models. This maximises the detection accuracy while keeping the false positive rate (FPR) low. We use three state-of-the-art datasets to evaluate the O’MINE algorithm and its ML models. Our results show that O’MINE can detect DDoS attacks with high accuracy (≈98% and ≈96% with full and scarce training data, respectively) and low FPR (≈0.22% and ≈0.72% with full and scarce training data, respectively), outperforming the state-of-the-art. Lastly, O’MINE only consumes a few device resources (≈6% of LUT and ≈4% of FF) on the Xlinx Alevo U250 FPGA we have used for inference at line rate.

Files

License info not available
warning

File under embargo until 26-02-2026