Topology-aware Detection and Localization of Distributed Denial-of-Service Attacks in Network-on-Chips

📅 2025-05-20
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the challenge of detecting and precisely localizing distributed denial-of-service (DDoS) attacks in network-on-chip (NoC) architectures, this paper proposes a topology-aware, end-to-end detection and localization framework based on graph neural networks (GNNs). The method directly encodes the physical NoC topology and takes raw inter-flit delay time-series data as input, jointly learning spatiotemporal traffic patterns without handcrafted features or predefined thresholds—ensuring architecture independence and dynamic adaptability. Experimental evaluation across diverse scenarios—including 2D/3D NoCs, multiple malicious IP distributions, varying injection rates, and heterogeneous application workloads—demonstrates consistent 99% accuracy in both attack detection and precise source localization. This significantly enhances SoC communication availability and security. To the best of our knowledge, this is the first work to apply GNNs for end-to-end, fine-grained DDoS detection and localization at the NoC level.

Technology Category

Application Category

📝 Abstract
Network-on-Chip (NoC) enables on-chip communication between diverse cores in modern System-on-Chip (SoC) designs. With its shared communication fabric, NoC has become a focal point for various security threats, especially in heterogeneous and high-performance computing platforms. Among these attacks, Distributed Denial of Service (DDoS) attacks occur when multiple malicious entities collaborate to overwhelm and disrupt access to critical system components, potentially causing severe performance degradation or complete disruption of services. These attacks are particularly challenging to detect due to their distributed nature and dynamic traffic patterns in NoC, which often evade static detection rules or simple profiling. This paper presents a framework to conduct topology-aware detection and localization of DDoS attacks using Graph Neural Networks (GNNs) by analyzing NoC traffic patterns. Specifically, by modeling the NoC as a graph, our method utilizes spatiotemporal traffic features to effectively identify and localize DDoS attacks. Unlike prior works that rely on handcrafted features or threshold-based detection, our GNN-based approach operates directly on raw inter-flit delay data, learning complex traffic dependencies without manual intervention. Experimental results demonstrate that our approach can detect and localize DDoS attacks with high accuracy (up to 99%) while maintaining consistent performance under diverse attack strategies. Furthermore, the proposed method exhibits strong robustness across varying numbers and placements of malicious IPs, different packet injection rates, application workloads, and architectural configurations, including both 2D mesh and 3D TSV-based NoCs. Our work provides a scalable, flexible, and architecture-agnostic defense mechanism, significantly improving the availability and trustworthiness of on-chip communication in future SoC designs.
Problem

Research questions and friction points this paper is trying to address.

Detect DDoS attacks in NoCs using GNNs
Localize attacks via spatiotemporal traffic analysis
Improve NoC security without manual feature engineering
Innovation

Methods, ideas, or system contributions that make the work stand out.

Uses Graph Neural Networks for DDoS detection
Analyzes spatiotemporal NoC traffic patterns
Operates on raw inter-flit delay data
🔎 Similar Papers
No similar papers found.