【24h】

DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features

机译:基于多业务量联合熵的DDoS洪泛攻击检测

获取原文
获取原文并翻译 | 示例

摘要

Distributed Denial of Service (DDoS) attacks are still considered as severe threats to the Internet. Previous works have used information entropy to detect DDoS flooding attacks. However, these methods usually only used source address as the feature of packets, and ignored other features. Besides, the entropy with single variable also has restricts in abnormal detection. In this paper, we propose a new joint-entropy-based DDoS detection solution with multiple features of packets. We choose flow duration, packet length, source address and destination port as the key features to detect different types of DDoS flooding attacks. We carry out the experiments with simulated campus network based on Software-defined Networking (SDN) architecture. The results show that our proposed method can effectively detect attacks of both forged and non-forged source address, and outperforms the previous single-entropy methods in terms of accuracy and false positive rate.
机译:分布式拒绝服务(DDoS)攻击仍然被认为是对Internet的严重威胁。先前的工作使用信息熵来检测DDoS泛洪攻击。但是,这些方法通常仅将源地址用作数据包的功能,而忽略其他功能。此外,具有单个变量的熵在异常检测中也有限制。在本文中,我们提出了一种新的基于联合熵的具有包特征的DDoS检测解决方案。我们选择流持续时间,数据包长度,源地址和目标端口作为检测不同类型DDoS泛洪攻击的关键功能。我们使用基于软件定义网络(SDN)架构的模拟校园网络进行了实验。结果表明,本文提出的方法可以有效地检测到伪造和非伪造源地址的攻击,并且在准确性和误报率方面均优于以前的单熵方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号