Entropy analysis method for attacks detection

Tamara Radivilova, Lyudmyla Kirichenko, Abed Saif Alghawli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

The paper proposes and implements a network traffic analysis method for detecting attacks, which is based on protocol analysis and the maximum entropy method. To analyze the quality of functioning of the proposed method, we used data from a data set that contains traffic of various protocols and DDoS attacks, UDP floods, TCP SYN streams, Ping of Death attacks, and HTTP flood attacks. The proposed method for analyzing the maximum entropy was software implemented and the results of its work showed high-quality attack detection. The method can detect various attacks with a probability of about 94%, while false-positive values did not exceed 10%. The advantage of the method is the early detection of intrusions, due to the rapid calculation of the maximum entropy using the sliding window method.

Original languageEnglish
Title of host publication2019 IEEE International Scientific-Practical Conference
Subtitle of host publicationProblems of Infocommunications Science and Technology, PIC S and T 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages443-446
Number of pages4
ISBN (Electronic)9781728141848
DOIs
StatePublished - Oct 2019
Event2019 IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T 2019 - Kyiv, Ukraine
Duration: 8 Oct 201911 Oct 2019

Publication series

Name2019 IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T 2019 - Proceedings

Conference

Conference2019 IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T 2019
Country/TerritoryUkraine
CityKyiv
Period8/10/1911/10/19

Keywords

  • Anomaly detection
  • Attack identification systems
  • DDoS attacks
  • Maximum entropy
  • Network traffic
  • Protocol analysis

Fingerprint

Dive into the research topics of 'Entropy analysis method for attacks detection'. Together they form a unique fingerprint.

Cite this