AN ABNORMAL-BASED APPROACH TO EFFECTIVELY DETECT DDOS ATTACKS

被引:0
作者
Li, Ke [1 ]
Zhou, Wanlei [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
基金
澳大利亚研究理事会;
关键词
DDoS; generalized entropy; attacks detection; FRACTIONAL BROWNIAN-MOTION;
D O I
10.1080/02533839.2009.9671575
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Distributed Denail-of-Service (DDoS) attacks are a serious threat to the safety and security of cyberspace. In this paper we propose a novel metric to detect DDoS attacks in the Internet. More precisely, we use the function of order alpha of the generalized (Renyi) entropy to distinguish DDoS attacks traffic from legitimate network traffic effectively. In information theory, entropies make up the basis for distance and divergence measures among various probability densities. We design our abnormal-based detection metric using the generalized entropy. The experimental results show that our proposed approach can not only detect DDoS attacks early (it can detect attacks one hop earlier than using the Shannon metric while order alpha = 2, and two hops earlier than the Shannon metric while order alpha = 10.) but can also reduce both the false positive rate and the false negative rate, compared with the traditional Shannon entropy metric approach.
引用
收藏
页码:889 / 895
页数:7
相关论文
共 50 条
  • [31] Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks
    Ribeiro, Marcos Aurelio
    Fonseca, Mauro Sergio Pereira
    de Santi, Juliana
    COMPUTERS & SECURITY, 2023, 134
  • [32] DNS Amplification Based DDoS Attacks in SDN Environment: Detection and Mitigation
    Gupta, Vishal
    Kochar, Amrit
    Saharan, Shail
    Kulshrestha, Rakhee
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 473 - 478
  • [33] Detecting TCP-based DDoS attacks by linear regression analysis
    Chen, EY
    2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 381 - 386
  • [34] SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks
    Belguith, Sana
    Asghar, Muhammad Rizwan
    Wang, Song
    Gomez, Karina
    Russello, Giovanni
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 608 - 617
  • [35] Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks
    Nosyk, Yevheniya
    Korczynski, Maciej
    Duda, Andrzej
    PASSIVE AND ACTIVE MEASUREMENT (PAM 2022), 2022, 13210 : 629 - 644
  • [36] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Omar E. Elejla
    Bahari Belaton
    Mohammed Anbar
    Ahmad Alnajjar
    Neural Computing and Applications, 2018, 30 : 45 - 56
  • [37] DATCONS: Protecting Web-Based QoS from DDoS Attacks
    Yuan, Yi
    Ng, Hoong Kee
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 935 - 938
  • [38] Ranking of Machine learning Algorithms Based on the Performance in Classifying DDoS Attacks
    Robinson, Rejimol R. R.
    Thomas, Ciza
    PROCEEDINGS OF THE 2015 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2015, : 185 - 190
  • [39] Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review
    Saleh, Mohammed A.
    Manaf, Azizah Abdul
    ADVANCED MACHINE LEARNING TECHNOLOGIES AND APPLICATIONS, AMLTA 2014, 2014, 488 : 145 - 152
  • [40] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Elejla, Omar E.
    Belaton, Bahari
    Anbar, Mohammed
    Alnajjar, Ahmad
    NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01) : 45 - 56