Show simple item record  

dc.contributor.authorKoay, Abigailen_NZ
dc.contributor.authorWelch, Ianen_NZ
dc.contributor.authorSeah, Winston K.G.en_NZ
dc.contributor.editorAttrapadung, N.en_NZ
dc.contributor.editorYagi, T.en_NZ
dc.coverage.spatialTokyo, Japanen_NZ
dc.date.accessioned2019-10-22T23:09:27Z
dc.date.available2019en_NZ
dc.date.available2019-10-22T23:09:27Z
dc.date.issued2019en_NZ
dc.identifier.citationKoay, A., Welch, I., & Seah, W. K. G. (2019). Effectiveness of entropy-based features in high-and low-intensity DDoS attacks detection. In N. Attrapadung & T. Yagi (Eds.), Proceedings of 14th International Workshop on Security (IWSEC 2019), Advances in Information and Computer Security, LNCS 11689 (pp. 207–217). Tokyo, Japan: Springer. https://doi.org/10.1007/978-3-030-26834-3_12en
dc.identifier.isbn978-3-030-26833-6en_NZ
dc.identifier.urihttps://hdl.handle.net/10289/13008
dc.description.abstractDDoS attack detection using entropy-based features in network traffic has become a popular approach among researchers in the last five years. The use of traffic distribution features constructed using entropy measures has been proposed as a better approach to detect Distributed Denial of Service (DDoS) attacks compared to conventional volumetric methods, but it still lacks in the generality of detecting various intensity DDoS attacks accurately. In this paper, we focus on identifying effective entropy-based features to detect both high- and low-intensity DDoS attacks by exploring the effectiveness of entropy-based features in distinguishing the attack from normal traffic patterns. We hypothesise that using different entropy measures, window sizes, and entropy-based features may affect the accuracy of detecting DDoS attacks. This means that certain entropy measures, window sizes, and entropy-based features may reveal attack traffic amongst normal traffic better than the others. Our experimental results show that using Shannon, Tsallis and Zhou entropy measures can achieve a clearer distinction between DDoS attack traffic and normal traffic than Rényi entropy. In addition, the window size setting used in entropy construction has minimal influence in differentiating between DDoS attack traffic and normal traffic. The result of the effectiveness ranking shows that the commonly used features are less effective than other features extracted from traffic headers.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherSpringeren_NZ
dc.rights© Springer Nature Switzerland AG 2019.This is the author's accepted version. The final publication is available at Springer via dx.doi.org/10.1007/978-3-030-26834-3_12
dc.subjectcomputer scienceen_NZ
dc.subjectDDoSen_NZ
dc.subjectentropyen_NZ
dc.subjecttraffic featuresen_NZ
dc.titleEffectiveness of entropy-based features in high-and low-intensity DDoS attacks detectionen_NZ
dc.typeConference Contribution
dc.identifier.doi10.1007/978-3-030-26834-3_12en_NZ
dc.relation.isPartOfProceedings of 14th International Workshop on Security (IWSEC 2019), Advances in Information and Computer Security, LNCS 11689en_NZ
pubs.begin-page207
pubs.elements-id241117
pubs.end-page217
pubs.finish-date2019-08-30en_NZ
pubs.start-date2019-08-28en_NZ


Files in this item

This item appears in the following Collection(s)

Show simple item record