Detect and Identify DDoS Attacks from Flash Crowd Based on Self-similarity and Renyi Entropy

被引:0
|
作者
Yan, Ruoyu [1 ]
Xu, Guoyu [1 ]
Qin, XueJing [1 ]
机构
[1] Henan Univ Econ & Law, Coll Comp & Informat Engn, Zhengzhou, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Distributed Denial of Service; Flash Crowd; Information Theory; Self-similarity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents an effective identification method for DDoS attacks and flash crowd in the source-end network. As DDoS attack and flash crowd behavior dramatically increase the number of new (or forged) source IP addresses, the method firstly construct a time series by counting the number of new (or forged) IP addresses in the monitored local area network, and use VTP (variance-time plots) method to verify its self-similarity in normal environments. Then, whittle estimator is used to calculate Hurst index and its confidence interval to detect anomalies. Based on the detection results, in order to accurately identify these two network behaviors, the paper further proposes Renyi entropy based method to distinguish DDoS attack from flash crowd according to the characteristic that DDoS attack and flash crowd cause different degrees of dispersion in source IP address. Finally experimental results indicate that this method can not only detect the mutation of network traffic in real time and reduce false positives, but also accurately distinguish DDoS attack from flash crowd in the background of large network traffic.
引用
收藏
页码:7188 / 7194
页数:7
相关论文
共 27 条
  • [1] Entropy-score: A Method to Detect DDoS Attack and Flash Crowd
    Gaurav, Akshat
    Singh, Awadhesh Kumar
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 1427 - 1431
  • [2] Using Renyi cross entropy to analyze traffic matrix and detect DDoS attacks
    Yan, Ruoyu
    Zheng, Qinghua
    [J]. Information Technology Journal, 2009, 8 (08) : 1180 - 1188
  • [3] Real-time method for DDoS attacks detection based on self-similarity and wavelet analysis
    Ren Xunyi
    Wang Ruchuan
    Qi Zhenghua
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01) : 90 - 94
  • [4] Detecting DDOS attack based on network self-similarity
    Xiang, Y
    Lin, Y
    Lei, WL
    Huang, SJ
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2004, 151 (03): : 292 - 295
  • [5] Renyi entropy and improved equilibration rates to self-similarity for nonlinear diffusion equations
    Carrillo, J. A.
    Toscani, G.
    [J]. NONLINEARITY, 2014, 27 (12) : 3159 - 3177
  • [6] Handling System Overload Resulting from DDoS Attacks and Flash Crowd Events
    Al-Ali, Zaid
    Al-Duwairi, Basheer
    Al-Hammouri, Ahmad T.
    [J]. 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 512 - 512
  • [7] An information divergence based approach to detect flooding DDoS attacks and Flash Crowds
    Kaur, Gursharanjeet
    Behal, Sunny
    Shifali
    [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 251 - 258
  • [8] Self-similarity based DDoS attack detection using Hurst parameter
    Deka, Rup K.
    Bhattacharyya, Dhruba K.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4468 - 4481
  • [9] Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates
    Aladaileh, Mohammad Adnan
    Anbar, Mohammed
    Hintaw, Ahmed J.
    Hasbullah, Iznan H.
    Bahashwan, Abdullah Ahmed
    Al-Sarawi, Shadi
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (12):
  • [10] Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review
    Saleh, Mohammed A.
    Manaf, Azizah Abdul
    [J]. ADVANCED MACHINE LEARNING TECHNOLOGIES AND APPLICATIONS, AMLTA 2014, 2014, 488 : 145 - 152