Entropy-Based Anomaly Detection in a Network

被引:13
作者
Shukla, Ajay Shankar [1 ]
Maurya, Rohit [2 ]
机构
[1] AIIA, New Delhi, India
[2] UBSoft, Pune, Maharashtra, India
关键词
Entropy; IDS; Snort;
D O I
10.1007/s11277-018-5288-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Every computer on the Internet these days is a potential target for a new attack at any moment. In this paper we propose a method to enhance network security using entropy based anomaly detection. Intrusion detection system Snort is used for collecting the complete network traffic. Snort alert is then processed for selecting the attributes. Then Shannon entropies are calculated to analyze source IP address, source port address, destination IP address, destination port address, source IP threat, source port threat, destination IP threat, destination port threat and datagram length. Renyi cross entropy method is applied on Shannon entropy vector to detect network attack. After detecting attack in network, list of source IP address, source port address, destination IP address, destination port address with respective number of attack are generated for the advance protection of the network. This facilitates the network administrator to block/unblock IP addresses and ports where is attacks were detected. In this method about 90% attacks are detected. The rest 10% network traffic could not be detected. Since some low priority network traffic being treated as genuine traffic.
引用
收藏
页码:1487 / 1501
页数:15
相关论文
共 33 条
  • [1] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [2] [Anonymous], 2015, GLOBAL STATE INFORM
  • [3] [Anonymous], P 23 ICDCS MAY
  • [4] Entropy-Based Internet Traffic Anomaly Detection: A Case Study
    Berezinski, Przemyslaw
    Pawelec, Jozef
    Malowidzki, Marek
    Piotrowski, Rata'
    [J]. PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON DEPENDABILITY AND COMPLEX SYSTEMS DEPCOS-RELCOMEX, 2014, 286 : 47 - 58
  • [5] Caswell B., 2004, Snort 2.1 Intrusion Detection
  • [6] Predictive Network Anomaly Detection and Visualization
    Celenk, Mehmet
    Conley, Thomas
    Willis, John
    Graham, James
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 288 - 299
  • [7] Chamoli N., 2014, Int. J. Comput. Appl., V97, P1
  • [8] Christiane F. L. L., 2012, P 13 INT C INT ENG A, P492
  • [9] Eimann R., 2005, NETWORK EVENT DETECT
  • [10] Gao Meng., 2014, Advanced Science and Technology Letters, V53, P429, DOI 10.14257/astl.2014.53.89