Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions

CoRR(2023)

引用 0|浏览6
暂无评分
摘要
Denial-of-Service (DoS) attacks are one the most common and consequential cyber attacks in computer networks. While existing research offers a plethora of detection methods, the issue of achieving scalability, a low false positive rate, and high detection accuracy remains open. In this work, we address this problem by developing a differential method based on generalized entropy progression. In this method, named as DoDGE, we continuously fit the line of best fit to the entropy progression of destination addresses and check if the derivative, that is, the slope of this line is less than the negative of the dynamically computed standard deviation of the derivatives. Furthermore, to distinguish from flash events, we leverage the symmetry that when a flash event occurs, the derivative of the entropy progression of source addresses is positive. With this design, we omit the usage of the thresholds and the results with five real-world network traffic datasets confirm that DoDGE outperforms threshold-based DoS attack detection by two orders of magnitude in terms of false positives on average. When compared to ten machine learning (ML) models, DoDGE achieves a balanced accuracy of 99%, while the average balanced accuracy for the ML models is 52%. Moreover, the results show that DoDGE successfully differentiates between a flash event and a DoS attack.
更多
查看译文
关键词
average balanced accuracy,common cyber attacks,computer networks,consequential cyber attacks,Denial-of-Service attacks,destination addresses,detection methods,differential analysis,differential method,DoDGE,false positives,flash event,generalized entropy progression,high detection accuracy,low false positive rate,real-world network traffic datasets,Service attack detection,source addresses,threshold-based DoS attack detection
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要