Methodology
Methodology
Our methodology for implementing lightweight deep learning for real-time DDoS
detection in SDN using programmable data planes consists of several key components
and processes. The approach leverages the capabilities of programmable switches to
perform sophisticated detection at line rate without burdening the SDN controller.
System Architecture
3. Control Plane Interface: For model updates, configuration, and attack mitigation
responses.
Our approach extracts relevant features directly in the data plane to minimize the
overhead of transmitting raw traffic data to external analysis systems:
Detection Process
4. Anomaly Detection: The CNN model processes these features to identify potential
DDoS attacks.
Implementation Details
2. Count Sketch Algorithm: For efficient flow monitoring and statistics collection [2][6].
Evaluation Methodology
3. Resource Utilization: Memory usage (SRAM and TCAM) and processing overhead.
Our experimental results demonstrate that the proposed approach can detect DDoS
attacks with high accuracy (98.2%) and low latency (approximately 250ms) while
maintaining low resource usage (dozens of kilobytes in SRAM per 1 Gbps link) [2].
1. https://www.simulamet.no/education/masters-students/masters-projects/detecting-ddos-attacks-
programmable-data-planes
2. https://lume.ufrgs.br/bitstream/handle/10183/204658/001110525.pdf
3. https://pure.qub.ac.uk/files/200160837/LUCID_PUBLIC_VERSION.pdf
4. https://arxiv.org/abs/2307.05936
5. https://www.nature.com/articles/s41598-024-67984-w
6. https://github.com/aclapolli/ddosd-p4