Conditional entropy-based hybrid DDoS detection model for IoT networks

被引:0
|
作者
Pandey, Nimisha [1 ]
Mishra, Pramod Kumar [1 ]
机构
[1] Banaras Hindu Univ, Inst Sci, Dept Comp Sci, Varanasi, India
关键词
Entropy; DDoS attack; Attack detection; IoT; ATTACKS;
D O I
10.1016/j.cose.2024.104199
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ina distributed denial-of-service (DDoS) attack, an attacker channelizes the resources of a botnet to launch denial of service attack on the victim. The increased use of IoT devices and dependence of users on e-services like online shopping and online payments have elevated the liability risks. The entropy provides a significant measure of randomness. The variation in entropy of traffic features determines the presence of abrupt traffic. This paper uses entropy and conditional entropy to achieve insights on data and feeds it to the proposed 2-stage detection approach for multi-class classification. The proposed model employs four classifiers for first hand classification. Further, stacking generalization-based second stage achieves the final detection process. The recently launched CIC IoT 2023 dataset is used to illustrate the findings of the study. The proposed approach produces an accuracy of 99.86%. Further, this paper utilizes relative entropy for the determination of deflection of traffic behavior between the attack and legitimate samples. Comparisons have been made among symmetric versions of information divergence, cent-divergence and Kullback-Leibler divergence along with, Hellinger distance and total variation distance. It is found that the information distance gives abetter differentiation between the entropy of legitimate traffic and attack traffic. Significance Statement Entropy has been manipulated to define the nature of incoming traffic for any rule-based detection. This work explores the significance of conditional entropy for the ML-based detection of DDoS attacks in a recently launched IoT-based dataset. Additionally, the effectiveness of KL-divergence, information divergence, cent-divergence, Hellinger distance and total variation distance is compared for differentiating between legitimate traffic and attack traffic.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] JESS: Joint Entropy-Based DDoS Defense Scheme in SDN
    Kalkan, Kubra
    Altay, Levent
    Gur, Gurkan
    Alagoz, Fatih
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (10) : 2358 - 2372
  • [22] Optimized Ensemble Model with Genetic Algorithm for DDoS Attack Detection in IoT Networks
    Saiyed, Makhduma F.
    Al-Anbagi, Irfan
    2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, : 433 - 438
  • [23] Community Detection in Location-based Social Networks: An Entropy-based Approach
    Liu, Jiahao
    Li, You
    Ling, Guohui
    Li, Ronghua
    Zheng, Zibin
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 452 - 459
  • [24] An intelligent trust model for hybrid DDoS detection in software defined networks
    Gong, Changqing
    Yu, Delong
    Zhao, Liang
    Li, Xiguang
    Li, Xianwei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (16)
  • [25] A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism
    AbdelAzim, Nada M.
    Fahmy, Sherif F.
    Sobh, Mohammed Ali
    Eldin, Ayman M. Bahaa
    EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (01) : 85 - 90
  • [26] Entropy-Based Anomaly Detection in a Network
    Ajay Shankar Shukla
    Rohit Maurya
    Wireless Personal Communications, 2018, 99 : 1487 - 1501
  • [27] The Inadequacy of Entropy-Based Ransomware Detection
    McIntosh, Timothy
    Jang-Jaccard, Julian
    Watters, Paul
    Susnjak, Teo
    NEURAL INFORMATION PROCESSING, ICONIP 2019, PT V, 2019, 1143 : 181 - 189
  • [28] ENTROPY-BASED RAIN DETECTION AND REMOVAL
    Jha, Rajib Kumar
    Mohanty, Sraban Kumar
    Maitrey, Anand
    2013 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND EMBEDDED SYSTEMS (CARE-2013), 2013,
  • [29] Entropy-Based Anomaly Detection in a Network
    Shukla, Ajay Shankar
    Maurya, Rohit
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (04) : 1487 - 1501
  • [30] An Entropy-Based Approach: Handling Uncertainty in IoT Configurable Composition Reference Model (CCRM)
    Boulaares, Soura
    Sassi, Salma
    Faiz, Sami
    ADVANCES IN MODEL AND DATA ENGINEERING IN THE DIGITALIZATION ERA, MEDI 2022, 2022, 1751 : 193 - 206