DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs

Read original: arXiv:2403.13563 - Published 5/24/2024 by Haoyu Wang, Basel Halak, Jianjie Ren, Ahmad Atamli
Total Score

0

🤿

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper introduces a refined Denial-of-Service (DoS) model for Network-on-Chips (NoCs) and presents a novel framework called DL2Fence that uses Deep Learning (DL) and Frame Fusion (2F) for DoS detection and localization.
  • Two Convolutional Neural Network models were developed for classification and segmentation to detect and localize DoS attacks, respectively.
  • The framework achieves high detection and localization accuracies with low hardware overhead, demonstrating its effectiveness in large-scale NoCs.

Plain English Explanation

The paper focuses on a type of cyber attack called Denial-of-Service (DoS) that can disrupt the functioning of computer networks, specifically in the context of Network-on-Chips (NoCs). NoCs are the communication networks that connect different components within computer chips.

The researchers developed a refined model to simulate DoS attacks on NoCs, which helps them better understand and detect these attacks. They then created a new framework called DL2Fence that uses deep learning, a type of artificial intelligence, and a technique called frame fusion to detect and locate the source of DoS attacks within the NoC.

The deep learning models in DL2Fence were able to accurately detect and pinpoint the location of DoS attacks in a 16x16 mesh NoC with over 95% accuracy. Importantly, the framework was able to achieve this high performance while using significantly less hardware resources compared to previous approaches. This makes DL2Fence a promising solution for protecting large-scale computer chips from DoS attacks.

Technical Explanation

The paper introduces a refined Flooding Injection Rate-adjustable Denial-of-Service (DoS) model for Network-on-Chips (NoCs). It then presents a novel framework called DL2Fence that utilizes Deep Learning (DL) and Frame Fusion (2F) for DoS detection and localization.

Two Convolutional Neural Network (CNN) models were developed: one for classification to detect the presence of a DoS attack, and another for segmentation to localize the source of the attack. The classification model achieved a detection accuracy of 95.8%, while the segmentation model reached a localization accuracy of 91.7% in a 16x16 mesh NoC.

Notably, the hardware overhead of the DL2Fence framework decreased by 76.3% when scaling from an 8x8 to a 16x16 NoC. Additionally, the framework required 42.4% less hardware compared to state-of-the-art approaches.

Critical Analysis

The paper provides a comprehensive and rigorous evaluation of the DL2Fence framework, including comparisons to existing methods. However, the authors do not discuss potential limitations or areas for further research in depth.

One potential concern is the reliance on simulation-based experiments, which may not fully capture the complexities of real-world NoC environments. Additionally, the performance of the deep learning models may be sensitive to factors such as network topology, traffic patterns, and attack types, which could warrant further investigation.

It would be valuable to see the framework tested on more diverse and challenging NoC scenarios to assess its robustness and generalizability. The authors could also explore the potential for adversarial attacks against the deep learning models and how to make the framework more resilient to such attacks.

Conclusion

This paper presents a novel framework called DL2Fence that leverages deep learning and frame fusion techniques to effectively detect and localize Denial-of-Service (DoS) attacks in Network-on-Chip (NoC) systems. The framework's high detection and localization accuracies, coupled with its low hardware overhead, make it a promising solution for securing large-scale NoCs against DoS attacks.

The research demonstrates the potential of combining deep learning with domain-specific knowledge to tackle complex security challenges in the field of computer architecture. As the complexity of computer chips continues to grow, frameworks like DL2Fence could play a crucial role in ensuring the reliability and resilience of these systems in the face of evolving cyber threats.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🤿

Total Score

0

DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs

Haoyu Wang, Basel Halak, Jianjie Ren, Ahmad Atamli

This study introduces a refined Flooding Injection Rate-adjustable Denial-of-Service (DoS) model for Network-on-Chips (NoCs) and more importantly presents DL2Fence, a novel framework utilizing Deep Learning (DL) and Frame Fusion (2F) for DoS detection and localization. Two Convolutional Neural Networks models for classification and segmentation were developed to detect and localize DoS respectively. It achieves detection and localization accuracies of 95.8% and 91.7%, and precision rates of 98.5% and 99.3% in a 16x16 mesh NoC. The framework's hardware overhead notably decreases by 76.3% when scaling from 8x8 to 16x16 NoCs, and it requires 42.4% less hardware compared to state-of-the-arts. This advancement demonstrates DL2Fence's effectiveness in balancing outstanding detection performance in large-scale NoCs with extremely low hardware overhead.

Read more

5/24/2024

Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach
Total Score

0

Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach

Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani

Distributed Denial of Service (DDoS) attacks pose an increasingly substantial cybersecurity threat to organizations across the globe. In this paper, we introduce a new deep learning-based technique for detecting DDoS attacks, a paramount cybersecurity challenge with evolving complexity and scale. Specifically, we propose a new dual-space prototypical network that leverages a unique dual-space loss function to enhance detection accuracy for various attack patterns through geometric and angular similarity measures. This approach capitalizes on the strengths of representation learning within the latent space (a lower-dimensional representation of data that captures complex patterns for machine learning analysis), improving the model's adaptability and sensitivity towards varying DDoS attack vectors. Our comprehensive evaluation spans multiple training environments, including offline training, simulated online training, and prototypical network scenarios, to validate the model's robustness under diverse data abundance and scarcity conditions. The Multilayer Perceptron (MLP) with Attention, trained with our dual-space prototypical design over a reduced training set, achieves an average accuracy of 94.85% and an F1-Score of 94.71% across our tests, showcasing its effectiveness in dynamic and constrained real-world scenarios.

Read more

6/6/2024

🧠

Total Score

0

A Novel Self-Attention-Enabled Weighted Ensemble-Based Convolutional Neural Network Framework for Distributed Denial of Service Attack Classification

Kanthimathi S, Shravan Venkatraman, Jayasankar K S, Pranay Jiljith T, Jashwanth R

Distributed Denial of Service (DDoS) attacks are a major concern in network security, as they overwhelm systems with excessive traffic, compromise sensitive data, and disrupt network services. Accurately detecting these attacks is crucial to protecting network infrastructure. Traditional approaches, such as single Convolutional Neural Networks (CNNs) or conventional Machine Learning (ML) algorithms like Decision Trees (DTs) and Support Vector Machines (SVMs), struggle to extract the diverse features needed for precise classification, resulting in suboptimal performance. This research addresses this gap by introducing a novel approach for DDoS attack detection. The proposed method combines three distinct CNN architectures: SA-Enabled CNN with XGBoost, SA-Enabled CNN with LSTM, and SA-Enabled CNN with Random Forest. Each model extracts features at multiple scales, while self-attention mechanisms enhance feature integration and relevance. The weighted ensemble approach ensures that both prominent and subtle features contribute to the final classification, improving adaptability to evolving attack patterns and novel threats. The proposed method achieves a precision of 98.71%, an F1-score of 98.66%, a recall of 98.63%, and an accuracy of 98.69%, outperforming traditional methods and setting a new benchmark in DDoS attack detection. This innovative approach addresses critical limitations in current models and advances the state of the art in network security.

Read more

9/4/2024

C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks
Total Score

0

C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks

Osama Mustafa, Khizer Ali, Talha Naqash

The popularity of Software Defined Networks (SDNs) has grown in recent years, mainly because of their ability to simplify network management and improve network flexibility. However, this also makes them vulnerable to various types of cyber attacks. SDNs work on a centralized control plane which makes them more prone to network attacks. Research has demonstrated that deep learning (DL) methods can be successful in identifying intrusions in conventional networks, but their application in SDNs is still an open research area. In this research, we propose the use of DL techniques for intrusion detection in SDNs. We measure the effectiveness of our method by experimentation on a dataset of network traffic and comparing it to existing techniques. Our results show that the DL-based approach outperforms traditional methods in terms of detection accuracy and computational efficiency. The deep learning architecture that has been used in this research is a Long Short Term Memory Network and Self-Attention based architecture i.e. LSTM-Attn which achieves an Fl-score of 0.9721. Furthermore, this technique can be trained to detect new attack patterns and improve the overall security of SDNs.

Read more

9/2/2024