The widespread adoption of microservices captured the attention of attackers, mainly due to their distributed and dynamic nature. Unfortunately, traditional intrusion detection mechanisms may struggle to accurately and efficiently identify the most effective threats, for instance, DDoS campaigns. To advance in the security of modern microservice architectures, this paper presents an Intrusion Detection Agent (IDA) for the run-time identification and classification of DDoS campaigns. Specifically, the IDA takes advantage of AI to classify attacks in a multi-container environment. To prove the effectiveness of our approach, we collected data from a realistic testbed built on top of the Train Ticket framework. Then, a classification pipeline has been evaluated when used to identify four attack templates, i.e., Standard DDoS, Slow DDoS, GET floods, and SYN floods. Obtained results showcased that the AI-based IDA can correctly handle the considered offensive templates, even when the data is scarce. For instance, when a decision tree is used, our IDA achieves an accuracy of ∼0.991 by considering only 4% of measurements capturing the behavior of containers (e.g., the used RAM or the volume of network traffic).

Detecting DDoS Attacks in Microservice Architectures via AI-Based Agents

Ficco M.;Guerriero A.
2026

Abstract

The widespread adoption of microservices captured the attention of attackers, mainly due to their distributed and dynamic nature. Unfortunately, traditional intrusion detection mechanisms may struggle to accurately and efficiently identify the most effective threats, for instance, DDoS campaigns. To advance in the security of modern microservice architectures, this paper presents an Intrusion Detection Agent (IDA) for the run-time identification and classification of DDoS campaigns. Specifically, the IDA takes advantage of AI to classify attacks in a multi-container environment. To prove the effectiveness of our approach, we collected data from a realistic testbed built on top of the Train Ticket framework. Then, a classification pipeline has been evaluated when used to identify four attack templates, i.e., Standard DDoS, Slow DDoS, GET floods, and SYN floods. Obtained results showcased that the AI-based IDA can correctly handle the considered offensive templates, even when the data is scarce. For instance, when a decision tree is used, our IDA achieves an accuracy of ∼0.991 by considering only 4% of measurements capturing the behavior of containers (e.g., the used RAM or the volume of network traffic).
2026
9783031976025
9783031976032
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4918561
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact