Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection

被引:0
|
作者
Kenyon, Anthony [1 ]
Deka, Lipika [2 ]
Elizondo, David [2 ]
机构
[1] Hyperscalar Ltd., High Wycombe, HP22 4LW, United Kingdom
[2] School of Computer Science and Informatics, De Montfort University, Leicester,LE1 9BH, United Kingdom
来源
Future Internet | 2024年 / 16卷 / 12期
关键词
D O I
10.3390/fi16120470
中图分类号
学科分类号
摘要
The accurate and timely detection of cyber threats is critical to keeping our online economy and data safe. A key technique in early detection is the classification of unusual patterns of network behaviour, often hidden as low-frequency events within complex time-series packet flows. One of the ways in which such anomalies can be detected is to analyse the information entropy of the payload within individual packets, since changes in entropy can often indicate suspicious activity—such as whether session encryption has been compromised, or whether a plaintext channel has been co-opted as a covert channel. To decide whether activity is anomalous, we need to compare real-time entropy values with baseline values, and while the analysis of entropy in packet data is not particularly new, to the best of our knowledge, there are no published baselines for payload entropy across commonly used network services. We offer two contributions: (1) we analyse several large packet datasets to establish baseline payload information entropy values for standard network services, and (2) we present an efficient method for engineering entropy metrics from packet flows from real-time and offline packet data. Such entropy metrics can be included within feature subsets, thus making the feature set richer for subsequent analysis and machine learning applications. © 2024 by the authors.
引用
收藏
相关论文
共 50 条
  • [21] Network Anomaly Detection Using Random Forests and Entropy of Traffic Features
    Yao, Dong
    Yin, Meijuan
    Luo, Junyong
    Zhang, Silong
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 926 - 929
  • [22] Combining Entropy Measures for Anomaly Detection
    Munoz, Alberto
    Hernandez, Nicolas
    Moguerza, Javier M.
    Martos, Gabriel
    ENTROPY, 2018, 20 (09)
  • [23] On the Inefficient Use of Entropy for Anomaly Detection
    Javed, Mobin
    Ashfaq, Ayesha Binte
    Shafiq, M. Zubair
    Khayam, Syed Ali
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 369 - +
  • [24] Anomaly Detection and Visualization using Fisher Discriminant Clustering of Network Entropy
    Celenk, Mehmet
    Conley, Thomas
    Willis, John
    Graham, James
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 219 - 223
  • [25] Alert correlation framework for malware detection by anomaly-based packet payload analysis
    Maestre Vidal, Jorge
    Sandoval Orozco, Ana Luella
    Garcia Villalba, Luis Javier
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 97 : 11 - 22
  • [26] Payload Content based Network Anomaly Detection
    Thorat, Sandeep A.
    Khandelwal, Amit K.
    Bruhadeshwar, Bezawada
    Kishore, K.
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 134 - 139
  • [27] Entropy analysis of filtration flows
    Ametov, I.M.
    Jiqiren/Robot, 1998, 20 (06): : 26 - 31
  • [28] DETECTION OF ANOMALOUS PACKET TRAFFIC VIA ENTROPY
    Lawniczak, Anna T.
    Wu, Hao
    Di Stefan, Bruno N.
    2009 IEEE 22ND CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1 AND 2, 2009, : 70 - +
  • [29] Entropy analysis of filtration flows
    I. M. Ametov
    Journal of Engineering Physics and Thermophysics, 1999, 72 (1) : 24 - 29
  • [30] Renyi entropy-driven network traffic anomaly detection with dynamic threshold
    Yu, Haoran
    Yang, Wenchuan
    Cui, Baojiang
    Sui, Runqi
    Wu, Xuedong
    CYBERSECURITY, 2024, 7 (01):