Entropy-based collaborative detection of DDOS attacks on community networks
Yu, Shui and Zhou, Wanlei 2008, Entropy-based collaborative detection of DDOS attacks on community networks, in Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, IEEE, Piscataway, N.J., pp. 566-571.
International Conference on Pervasive Computing and Communications
Place of publication
A community network often operates with the same Internet service provider domain or the virtual network of different entities who are cooperating with each other. In such a federated network environment, routers can work closely to raise early warning of DDoS attacks to void catastrophic damages. However, the attackers simulate the normal network behaviors, e.g. pumping the attack packages as poisson distribution, to disable detection algorithms. It is an open question: how to discriminate DDoS attacks from surge legitimate accessing. We noticed that the attackers use the same mathematical functions to control the speed of attack package pumping to the victim. Based on this observation, the different attack flows of a DDoS attack share the same regularities, which is different from the real surging accessing in a short time period. We apply information theory parameter, entropy rate, to discriminate the DDoS attack from the surge legitimate accessing. We proved the effectiveness of our method in theory, and the simulations are the work in the near future. We also point out the future directions that worth to explore in the future.
Field of Research
080108 Neural, Evolutionary and Fuzzy Computation
Socio Economic Objective
890299 Computer Software and Services not elsewhere classified
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact email@example.com.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact firstname.lastname@example.org.