AN ABNORMAL-BASED APPROACH TO EFFECTIVELY DETECT DDOS ATTACKS

被引:0
|
作者
Li, Ke [1 ]
Zhou, Wanlei [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
基金
澳大利亚研究理事会;
关键词
DDoS; generalized entropy; attacks detection; FRACTIONAL BROWNIAN-MOTION;
D O I
10.1080/02533839.2009.9671575
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Distributed Denail-of-Service (DDoS) attacks are a serious threat to the safety and security of cyberspace. In this paper we propose a novel metric to detect DDoS attacks in the Internet. More precisely, we use the function of order alpha of the generalized (Renyi) entropy to distinguish DDoS attacks traffic from legitimate network traffic effectively. In information theory, entropies make up the basis for distance and divergence measures among various probability densities. We design our abnormal-based detection metric using the generalized entropy. The experimental results show that our proposed approach can not only detect DDoS attacks early (it can detect attacks one hop earlier than using the Shannon metric while order alpha = 2, and two hops earlier than the Shannon metric while order alpha = 10.) but can also reduce both the false positive rate and the false negative rate, compared with the traditional Shannon entropy metric approach.
引用
收藏
页码:889 / 895
页数:7
相关论文
共 50 条
  • [1] A new multistage approach to detect subtle DDoS attacks
    Wang, Fei
    Wang, Hailong
    Wang, Xiaofeng
    Su, Jinshu
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 198 - 213
  • [2] Probability principle of a reliable approach to detect signs of DDOS flood attacks
    Li, M
    Liu, JG
    Long, DY
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 596 - 599
  • [3] A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance
    Daneshgadeh, Salva
    Kemmerich, Thomas
    Ahmed, Tarem
    Baykal, Nazife
    2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
  • [4] ERM: An Accurate Approach to Detect DDoS Attacks Using Entropy Rate Measurement
    Zhou, Lu
    Sood, Keshav
    Xiang, Yong
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (10) : 1700 - 1703
  • [5] CHASED APPROACH TO DETECT DDOS
    Priya, Sathya
    Rajagopalan
    Ramakrishnan
    IIOAB JOURNAL, 2016, 7 (09) : 243 - 249
  • [6] An Effective Approach to Detect DDos Attack
    Manoj, R.
    Tripti, C.
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 3, 2013, 178 : 339 - 345
  • [7] Development of Simulator for Intrusion Detection System to Detect and Alarm the DDoS Attacks
    Mishra, Ved Prakash
    Shukla, Balvinder
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 803 - 806
  • [8] ORACLE: An Architecture for Collaboration of Data and Control Planes to Detect DDoS Attacks
    Gomez Macias, Sebastian
    Paschoal Gaspary, Luciano
    Felipe Botero, Juan
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 962 - 967
  • [9] An Overview of DDoS attacks based on DNS
    Alieyan, Kamal
    Kadhum, Mohammed M.
    Anbar, Mohammed
    Ul Rehman, Shafiq
    Alajmi, Naser K. A.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 276 - 280
  • [10] Machine Learning Techniques to Detect DDoS Attacks on VANET System: A Survey
    Alrehan, Alia Mohammed
    Al-Haidari, Fahd
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,