Entropy-based Network Traffic Anomaly Classification Method Resilient to Deception

被引:9
作者
Ibrahim, Juma [1 ]
Gajin, Slavko [1 ]
机构
[1] Univ Belgrade, Sch Elect Engn, Bul Kralja Aleksandra 73, Belgrade 11000, Serbia
关键词
anomaly classification; anomaly detection; entropy; entropy deception; network behaviour analysis; FLOW; ATTACKS;
D O I
10.2298/CSIS201229045I
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Entropy-based network traffic anomaly detection techniques are attractive due to their simplicity and applicability in a real-time network environment. Even though flow data provide only a basic set of information about network communications, they are suitable for efficient entropy-based anomaly detection techniques. However, a recent work reported a serious weakness of the general entropy-based anomaly detection related to its susceptibility to deception by adding spoofed data that camouflage the anomaly. Moreover, techniques for further classification of the anomalies mostly rely on machine learning, which involves additional complexity. We address these issues by providing two novel approaches. Firstly, we propose an efficient protection mechanism against entropy deception, which is based on the analysis of changes in different entropy types, namely Shannon, Renyi, and Tsallis entropies, and monitoring the number of distinct elements in a feature distribution as a new detection metric. The proposed approach makes the entropy techniques more reliable. Secondly, we have extended the existing entropy-based anomaly detection approach with the anomaly classification method. Based on a multivariate analysis of the entropy changes of multiple features as well as aggregation by complex feature combinations, entropy-based anomaly classification rules were proposed and successfully verified through experiments. Experimental results are provided to validate the feasibility of the proposed approach for practical implementation of efficient anomaly detection and classification method in the general real-life network environment.
引用
收藏
页码:87 / 116
页数:30
相关论文
共 39 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]  
Allman M, 2007, IMC'07: PROCEEDINGS OF THE 2007 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P77
[3]  
[Anonymous], NetVizura Netflow Analyzer, Case study-DDoS Attack by NTP Amplification
[4]  
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[5]   An Entropy-Based Network Anomaly Detection Method [J].
Berezinski, Przemyslaw ;
Jasiul, Bartosz ;
Szpyrka, Marcin .
ENTROPY, 2015, 17 (04) :2367-2408
[6]   A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method [J].
Bojovic, P. D. ;
Basicevic, I. ;
Ocovaj, S. ;
Popovic, M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 :84-96
[7]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[8]  
Claise B, RFC 3954
[9]  
Ertoz L., NEXT GENERATION DATA
[10]  
Fachkha C, 2014, INT CONF NEW TECHNOL