Entropy-Based Anomaly Detection in a Network

被引:13
|
作者
Shukla, Ajay Shankar [1 ]
Maurya, Rohit [2 ]
机构
[1] AIIA, New Delhi, India
[2] UBSoft, Pune, Maharashtra, India
关键词
Entropy; IDS; Snort;
D O I
10.1007/s11277-018-5288-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Every computer on the Internet these days is a potential target for a new attack at any moment. In this paper we propose a method to enhance network security using entropy based anomaly detection. Intrusion detection system Snort is used for collecting the complete network traffic. Snort alert is then processed for selecting the attributes. Then Shannon entropies are calculated to analyze source IP address, source port address, destination IP address, destination port address, source IP threat, source port threat, destination IP threat, destination port threat and datagram length. Renyi cross entropy method is applied on Shannon entropy vector to detect network attack. After detecting attack in network, list of source IP address, source port address, destination IP address, destination port address with respective number of attack are generated for the advance protection of the network. This facilitates the network administrator to block/unblock IP addresses and ports where is attacks were detected. In this method about 90% attacks are detected. The rest 10% network traffic could not be detected. Since some low priority network traffic being treated as genuine traffic.
引用
收藏
页码:1487 / 1501
页数:15
相关论文
共 50 条
  • [1] Entropy-Based Anomaly Detection in a Network
    Ajay Shankar Shukla
    Rohit Maurya
    [J]. Wireless Personal Communications, 2018, 99 : 1487 - 1501
  • [2] Entropy-based Network Anomaly Detection
    Callegari, Christian
    Giordano, Stefano
    Pagano, Michele
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 334 - 340
  • [3] An Entropy-Based Network Anomaly Detection Method
    Berezinski, Przemyslaw
    Jasiul, Bartosz
    Szpyrka, Marcin
    [J]. ENTROPY, 2015, 17 (04) : 2367 - 2408
  • [4] Entropy-Based Feature Selection for Network Anomaly Detection
    Alabi, Ruth
    Yurtkan, Kamil
    [J]. 2018 2ND INTERNATIONAL SYMPOSIUM ON MULTIDISCIPLINARY STUDIES AND INNOVATIVE TECHNOLOGIES (ISMSIT), 2018, : 563 - 569
  • [5] Entropy-based Robust PCA for Communication Network Anomaly Detection
    Liu, Duo
    Lung, Chung-Horng
    Seddigh, Nabil
    Nandy, Biswajit
    [J]. 2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 171 - 175
  • [6] Machine Learning Enhanced Entropy-Based Network Anomaly Detection
    Timcenko, Valentina
    Gajin, Slavko
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2021, 21 (04) : 51 - 60
  • [7] An Efficient Entropy-based Network Anomaly Detection Method Using MIB
    Zhao, Lei
    Wang, Fu
    [J]. PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, : 428 - 432
  • [8] CUSUM-based and Entropy-based Network Anomaly Detection: an Experimental Comparison
    Callegari, Christian
    Pagano, Michele
    Giordano, Stefano
    Berizzi, Fabrizio
    [J]. PROCEEDINGS OF THE 2017 8TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2017, : 132 - 134
  • [9] ENTVis: A Visual Analytic Tool for Entropy-Based Network Traffic Anomaly Detection
    Zhou, Fangfang
    Huang, Wei
    Zhao, Ying
    Shi, Yang
    Liang, Xing
    Fan, Xiaoping
    [J]. IEEE COMPUTER GRAPHICS AND APPLICATIONS, 2015, 35 (06) : 42 - 50
  • [10] Entropy-Based Anomaly Detection for Gaussian Mixture Modeling
    Scrucca, Luca
    [J]. ALGORITHMS, 2023, 16 (04)