Distributed denial-of-service attack detection scheme-based joint-entropy

被引:10
作者
Rahmani, Hamza [1 ]
Sahli, Nabil [1 ]
Kamoun, Farouk [1 ]
机构
[1] Univ Campus Manouba, Natl Sch Comp Sci Tunis, CRISTAL Lab, Manouba 2010, Tunisia
关键词
distributed denial-of-service; flash crowd; stochastic process; entropy; joint-entropy;
D O I
10.1002/sec.392
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed denial-of-service (DDoS) attacks present an increasing threat to the global inter-networking infrastructure. While entropy schemes are highly robust to diverse network conditions, they remain vulnerable to distribute attacks that are similar to legitimate traffic. With the knowledge that the objective of a DDoS attack is to saturate as soon as possible the resources of the target, this would engender an unexpected disproportion between the number of received packets and the number of connections. However, in the case of flash crowds, an increase in the number of packets is always accompanied by an increase in the number of connections. In this work, we used joint-entropy that quantifies the degree of disproportion to detect traffic anomalies. We investigate a class of intelligent attacks, which, unlike high-rate attacks, are difficult for entropy schemes to detect. The experimental results indicate that our joint-entropy scheme can detect this type of attacks accurately. Compared with an entropy-based scheme, the improvement is 40% for the distributed attacks. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1049 / 1061
页数:13
相关论文
共 23 条
  • [1] [Anonymous], 2000, IETF
  • [2] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [3] Wavelet based denial-of-service detection
    Carl, Glenn
    Brooks, Richard R.
    Rai, Suresh
    [J]. COMPUTERS & SECURITY, 2006, 25 (08) : 600 - 615
  • [4] Chen Y, 2006, INT S COLLAB TECHNOL, P401
  • [5] Controlling IP spoofing through interdomain packet filters
    Duan, Zhenhai
    Yuan, Xin
    Chandrashekar, Jaideep
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (01) : 22 - 36
  • [6] Eddy Wesley., 2007, TCP SYN Flooding Attacks and Common Mitigations
  • [7] An application of information theory to intrusion detection
    Eiland, E. Earl
    Liebrock, Lorie M.
    [J]. FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 119 - +
  • [8] Statistical approaches to DDoS attack detection and response
    Feinstein, L
    Schnackenberg, D
    Balupari, R
    Kindred, D
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 303 - 314
  • [9] Impact of denial of service solutions on network quality of service
    Fowler, Scott
    Zeadally, Sherali
    Chilamkurti, Naveen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1089 - 1103
  • [10] Detecting Denial-of-Service attacks using the wavelet transform
    Hamdi, Mohamed
    Boudriga, Noureddine
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3203 - 3213