Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation

被引:39
作者
Behal, Sunny [1 ]
Kumar, Krishan [2 ]
机构
[1] IKG Punjab Tech Univ, Kapurthala, Punjab, India
[2] Shaheed Bhagat Singh State Tech Campus, Dept CSE, Ferozepur, Punjab, India
关键词
Network security; DDoS attacks; Flash events; Entropy; Information distance; SERVICE ATTACKS;
D O I
10.1016/j.comcom.2017.02.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Distributed Denial of Service (DDoS) attack is an austere menace to extensively used Internet-based services. The in-time detection of DDoS attacks poses a tough challenge to network security. Revealing a low-rate DDoS (LR-DDoS) attack is comparatively more difficult in modern high speed networks, since it can easily conceal itself due to its similarity with legitimate traffic, and so eluding current anomaly based detection methods. This paper investigates the aptness and impetus of the information theory-based generalized entropy (GE) and generalized information distance (GID) metrics in detecting different types of DDoS attacks. The results of GE and GID metrics are compared with Shannon entropy and other popular information divergence measures. In addition, the feasibility of using these metrics in discriminating a high-rate DDoS (HR-DDoS) attack from a similar looking legitimate flash event (FE) is also verified. We used real and synthetically generated datasets to elucidate the efficiency and effectiveness of the proposed detection scheme in detecting different types of DDoS attacks and FEs. The results clearly show that the GE and GID metrics perform well in comparison with other metrics and have reduced false positive rate (FPR). (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:18 / 28
页数:11
相关论文
共 41 条
[1]  
Alcorn J.A., 2014, 2014 23 INT C COMPUT, P1
[2]  
[Anonymous], 2010, CAIDA DDOS ATTACK DA
[3]  
[Anonymous], 2015, ARBOR NETWORKS WISR
[4]  
[Anonymous], 2013, Journal of Catalysts, DOI DOI 10.1155/2013/364275
[5]  
[Anonymous], 2000, MIT LINCOLN LAB LLSD
[6]  
[Anonymous], 2016, THE CORE EMULATOR
[7]  
[Anonymous], 1998, FIFA WORLD CUP DATAS
[8]  
[Anonymous], 1998, HTTPERF TOOL MEASURI, DOI DOI 10.1145/306225.306235
[9]  
Avallone S, 2004, INT CONF QUANT EVAL, P316
[10]  
Behal S., 2016, INT J NETW SECURITY, V19, P383