Entropy-Based Anomaly Detection in a Network

被引:0
作者
Ajay Shankar Shukla
Rohit Maurya
机构
[1] All India Institute of Ayurveda (AIIA),
[2] UBSoft,undefined
来源
Wireless Personal Communications | 2018年 / 99卷
关键词
Entropy; IDS; Snort;
D O I
暂无
中图分类号
学科分类号
摘要
Every computer on the Internet these days is a potential target for a new attack at any moment. In this paper we propose a method to enhance network security using entropy based anomaly detection. Intrusion detection system Snort is used for collecting the complete network traffic. Snort alert is then processed for selecting the attributes. Then Shannon entropies are calculated to analyze source IP address, source port address, destination IP address, destination port address, source IP threat, source port threat, destination IP threat, destination port threat and datagram length. Renyi cross entropy method is applied on Shannon entropy vector to detect network attack. After detecting attack in network, list of source IP address, source port address, destination IP address, destination port address with respective number of attack are generated for the advance protection of the network. This facilitates the network administrator to block/unblock IP addresses and ports where is attacks were detected. In this method about 90% attacks are detected. The rest 10% network traffic could not be detected. Since some low priority network traffic being treated as genuine traffic.
引用
收藏
页码:1487 / 1501
页数:14
相关论文
共 53 条
[41]  
Chamoli N(undefined)undefined undefined undefined undefined-undefined
[42]  
Kukreja S(undefined)undefined undefined undefined undefined-undefined
[43]  
Semwal M(undefined)undefined undefined undefined undefined-undefined
[44]  
Sharma S(undefined)undefined undefined undefined undefined-undefined
[45]  
Agrawal J(undefined)undefined undefined undefined undefined-undefined
[46]  
Sharma S(undefined)undefined undefined undefined undefined-undefined
[47]  
Tapaswi S(undefined)undefined undefined undefined undefined-undefined
[48]  
Liu T(undefined)undefined undefined undefined undefined-undefined
[49]  
Wang Z(undefined)undefined undefined undefined undefined-undefined
[50]  
Wang H(undefined)undefined undefined undefined undefined-undefined