AN ABNORMAL-BASED APPROACH TO EFFECTIVELY DETECT DDOS ATTACKS

被引:0
作者
Li, Ke [1 ]
Zhou, Wanlei [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3217, Australia
基金
澳大利亚研究理事会;
关键词
DDoS; generalized entropy; attacks detection; FRACTIONAL BROWNIAN-MOTION;
D O I
10.1080/02533839.2009.9671575
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Distributed Denail-of-Service (DDoS) attacks are a serious threat to the safety and security of cyberspace. In this paper we propose a novel metric to detect DDoS attacks in the Internet. More precisely, we use the function of order alpha of the generalized (Renyi) entropy to distinguish DDoS attacks traffic from legitimate network traffic effectively. In information theory, entropies make up the basis for distance and divergence measures among various probability densities. We design our abnormal-based detection metric using the generalized entropy. The experimental results show that our proposed approach can not only detect DDoS attacks early (it can detect attacks one hop earlier than using the Shannon metric while order alpha = 2, and two hops earlier than the Shannon metric while order alpha = 10.) but can also reduce both the false positive rate and the false negative rate, compared with the traditional Shannon entropy metric approach.
引用
收藏
页码:889 / 895
页数:7
相关论文
共 50 条
  • [41] Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection
    Omar E. Elejla
    Mohammed Anbar
    Bahari Belaton
    Basem O. Alijla
    Arabian Journal for Science and Engineering, 2018, 43 : 7757 - 7775
  • [42] Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection
    Elejla, Omar E.
    Anbar, Mohammed
    Belaton, Bahari
    Alijla, Basem O.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7757 - 7775
  • [43] Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach
    Kim, Tae Hwan
    Kim, Dong Seong
    Jung, Hee Young
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (07) : 1511 - 1522
  • [44] A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs
    Gaurav, Akshat
    Gupta, Brij B.
    Panigrahi, Prabin Kumar
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2022, 177
  • [45] Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments
    Novaes, Matheus P.
    Carvalho, Luiz F.
    Lloret, Jaime
    Proenca, Mario Lemes, Jr.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 156 - 167
  • [46] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [47] DDoS Mitigation: A Measurement-Based Approach
    Jonker, Mattijs
    Sperotto, Anna
    Pras, Aiko
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [48] Unveiling the Power of Collaboration: Detect DDoS Attacks on Proxies through Moving Target Defense with Multi-Proxy Synergy
    Ren, Changjun
    Yan, Lin
    Yang, Shujie
    Zhou, Zan
    Sun, Yi
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 112 - 117
  • [49] BEHAVIOR-BASED CLUSTERING FOR DISCRIMINATION BETWEEN FLASH CROWDS AND DDoS ATTACKS
    Heo, Young Jun
    Oh, Jintae
    Jang, Jongsoo
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 140 - 143
  • [50] ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review
    Elejla, Omar E.
    Anbar, Mohammed
    Belaton, Bahari
    IETE TECHNICAL REVIEW, 2017, 34 (04) : 390 - 407