FlowPrint-P4: Lightweight Behavioral Anomaly Detection for DDoS Mitigation in Programmable Networks

Authors

  • Aya Hassan Department of Information Technology, Faculty of Computers and Informatics, Zagazig University, Zagazig 44511, Egypt and Department of Information Technology, Faculty of Computers and Informatics, Damnhour University, Nubaria 22773, Egypt
  • Marwa M. Khashaba Department of Information Technology, Faculty of Computers and Informatics, Zagazig University, Zagazig 44511, Egypt
  • Ehab R. Mohamed Department of Information Technology, Faculty of Computers and Informatics, Zagazig University, Zagazig 44511, Egypt
  • Ameer El-Sayed Department of Information Technology, Faculty of Computers and Informatics, Zagazig University, Zagazig 44511, Egypt

Keywords:

SDN, IoT Security, Behavioral Flow Fingerprinting, In-Network DDoS Detection, Real-Time Mitigation, Flow-Based Traffic Analysis.

Abstract

Distributed Denial-of-Service (DDoS) attacks continue to pose significant threats to modern programmable and IoT-enabled networks by overwhelming bandwidth, exhausting server resources, and degrading service availability. Traditional mitigation approaches largely depend on centralized control-plane analysis and volumetric thresholds, which introduce detection latency and remain ineffective against stealthy or low-rate attacks. This paper presents FlowPrint-P4, a lightweight in-network DDoS detection and mitigation framework based on behavioral flow fingerprinting implemented directly within P4-programmable data planes. The proposed framework analyzes flow-level behavioral features, including TTL variance, SYN/ACK asymmetry, TCP flag anomalies, burstiness patterns, and connection churn rates, enabling real-time identification of malicious traffic without reliance on external controllers. FlowPrint-P4 performs inline detection and packet tagging entirely within the switch pipeline, allowing immediate mitigation actions such as dropping, rate limiting, or redirection at line rate. Experimental evaluation was conducted using the CIC-IoT2023, ToN-IoT, and CIC-IoMT2024 benchmark datasets within a BMv2-Mininet programmable networking environment. Results demonstrate high detection effectiveness across multiple DDoS categories, including TCP SYN floods, UDP floods, ICMP floods, reflection/amplification attacks, and slow-rate application-layer attacks. The framework achieved high classification accuracy with low false positive and false negative rates while maintaining scalability and low processing overhead. These findings demonstrate the feasibility of behavioral fingerprinting as a practical and efficient approach for real-time in-network DDoS mitigation in programmable networks.

Downloads

Download data is not yet available.

Published

2026-05-23

How to Cite

Hassan, A., Khashaba, M. M., Mohamed, E. R., & El-Sayed , A. (2026). FlowPrint-P4: Lightweight Behavioral Anomaly Detection for DDoS Mitigation in Programmable Networks. International Journal of Computers and Informatics (Zagazig University), 11, 16–35. Retrieved from https://www.ijci.zu.edu.eg/index.php/ijci/article/view/174