Application of entropy formulas in detection of denial-of-service attacks

被引:6
作者
Basicevic, Ilija [1 ]
Ocovaj, Stanislav [2 ]
机构
[1] Univ Novi Sad, Fac Tech Sci, Novi Sad, Serbia
[2] RT RK Inst Comp Based Syst, Dept Embedded Syst, Novi Sad, Serbia
关键词
denial-of-service (DoS) attack; fractional entropy; network security; Renyi entropy; Shannon entropy; Tsallis entropy; DDOS ATTACKS; TSALLIS;
D O I
10.1002/dac.4067
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper compares five entropy formulas (Shannon, Tsallis, Renyi, Bhatia-Singh, and Ubriaco) and their application in the detection of distributed denial-of-service (DDoS) attacks. The Shannon formula has been used extensively for this purpose for more than a decade. The use of the Tsallis and Renyi formulas in this context has also been proposed. Bhatia-Singh entropy is a novel information metric with promising results in initial applications in this area. Ubriaco proposed an entropy function based on the fractional calculus. In this paper, flow size distribution was used as the input for detection. The type of DDoS attack is SYN flood, and simulation was used to obtain the input dataset. The results show that the Renyi and Bhatia-Singh detectors perform better than the rest. Renyi and Tsallis performed similarly with respect to the true positive rate, but Renyi had a much lower false positive rate. The Bhatia-Singh detector had the best true positive rate but a higher false positive rate than Renyi. The Ubriaco detector performed similar to the Shannon detector. With respect to detection delay, Tsallis, Ubriaco, and Shannon produced similar results, with a slight advantage associated with the Ubriaco detector, while Renyi and Bhatia-Singh had a larger detection delay than the former three.
引用
收藏
页数:12
相关论文
共 34 条
[1]   The value of flow size distribution in entropy-based detection of DoS attacks [J].
Basicevic, Ilija ;
Ocovaj, Stanislav ;
Popovic, Miroslav .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) :958-965
[2]   Use of Tsallis entropy in detection of SYN flood DoS attacks [J].
Basicevic, Ilija ;
Ocovaj, Stanislav ;
Popovic, Miroslav .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3634-3640
[3]   Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks [J].
Basicevic, Ilija ;
Ocovaj, Stanislav ;
Popovic, Miroslav .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) :837-844
[4]   Detection of DDoS attacks and flash events using novel information theory metrics [J].
Behal, Sunny ;
Kumar, Krishan .
COMPUTER NETWORKS, 2017, 116 :96-110
[5]   An Entropy-Based Network Anomaly Detection Method [J].
Berezinski, Przemyslaw ;
Jasiul, Bartosz ;
Szpyrka, Marcin .
ENTROPY, 2015, 17 (04) :2367-2408
[6]   On a New Csiszar's f-Divergence Measure [J].
Bhatia, P. K. ;
Singh, Surender .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2013, 13 (02) :43-57
[7]   An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
PATTERN RECOGNITION LETTERS, 2015, 51 :1-7
[8]   A comprehensive study of queue management as a DoS counter-measure [J].
Boteanu, Daniel ;
Fernandez, Jose M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (05) :347-382
[9]   A cascade architecture for DoS attacks detection based on the wavelet transform [J].
Dainotti, Alberto ;
Pescape, Antonio ;
Ventre, Giorgio .
JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) :945-968
[10]  
Eddy W, 2007, 4987 RFC IETF TRUST