Entropy based detection of DDoS attacks in packet switching network models

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Distributed denial-of-service (DDoS) attacks are network-wide attacks that cannot be detected or stopped easily. They affect "natural" spatiotemporal packet traffic patterns, i.e. "natural distributions" of packets passing through the routers. Thus, they affect "natural" information entropy profiles, a sort of "fingerprints", of normal packet traffic. We study if by monitoring information entropy of packet traffic through selected routers one may detect DDoS attacks or anomalous packet traffic in packet switching network (PSN) models. Our simulations show that the considered DDoS attacks of "ping" type cause shifts in information entropy profiles of packet traffic monitored even at small sets of routers and that it is easier to detect these shifts if static routing is used instead of dynamic routing. Thus, network-wide monitoring of information entropy of packet traffic at properly selected routers may provide means for detecting DDoS attacks and other anomalous packet traffics. © 2009 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

Cite

CITATION STYLE

APA

Lawniczak, A. T., Wu, H., & Di Stefano, B. (2009). Entropy based detection of DDoS attacks in packet switching network models. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 5 LNICST, pp. 1810–1822). https://doi.org/10.1007/978-3-642-02469-6_57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free