2009 Canadian Conference on Electrical and Computer Engineering 2009
DOI: 10.1109/ccece.2009.5090107
|View full text |Cite
|
Sign up to set email alerts
|

Detection of anomalous packet traffic via entropy

Abstract: We study if information entropy of packet traffic passing through selected set of routers may detect anomalous packet traffic (e.g., distributed denial-of-service (DDoS) attacks) in a packet switching network (PSN) model. Given a certain PSN model setup (i.e., topology, routing algorithm, and source load value) a "natural" entropy profile of normal packet traffic monitored at selected routers characterizes normal operation of PSN model. When entropy of packet traffic deviates significantly from this "natural" … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…FAEB scheme does so periodically based on the adopted time in the module's configuration by calculating entropy of overall requests through the following formulas [5055]: entropy=Pilog2Pi,Pi=uri_countstotal_counts. …”
Section: Flexible Collaborative Multilayer Ddos Prevention Frammentioning
confidence: 99%
“…FAEB scheme does so periodically based on the adopted time in the module's configuration by calculating entropy of overall requests through the following formulas [5055]: entropy=Pilog2Pi,Pi=uri_countstotal_counts. …”
Section: Flexible Collaborative Multilayer Ddos Prevention Frammentioning
confidence: 99%
“…In other words, the statistically self-similar models in these papers only focus on the changes of traffic value not considering the impact of distributional aspects of packet (called packet composition). Intuitively, DoS attacks are purposely created by humans they must affect the natural "structure and randomness" of packet under normal conditions [9]. Jiangtao Shi [10] controlled the number of packets with statistically self-similar model, however, the generation of IP address and Port is based on probabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Second, unusual distributions reveal valuable information about the structure of anomalies. Current research in the traffic composition mainly relies on the theory of entropy [9][11] [12][13] by which network anomalies can be detected. However, the flaw of entropy methodology is that it can only reflect the overall trend of traffic and not sensitive to the dynamics of traffic specific composition.…”
Section: Introductionmentioning
confidence: 99%