Skip to main content

Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022)

Abstract

Nowadays, Hackers are everywhere. Current information systems often suffer from attacks anytime. Also, 5G network have gradually entered human lives to satisfy our network-service needs. At present, without human intervention, 5G networks still lack tools to automatically detect attacks and identify flash events. Many scholars and experts have proposed mechanisms to defend DDoS attacks, including detecting attacks and mitigating the damage caused by attacks. However, there is no security mechanism to defend DDoS attacks in the 5G networks. In other words, the existing defense systems cannot effectively protect 5G users and their infrastructures. Therefore, in this research, we present a system called Detection and Defense of DDoS on 5G (DDD5G for short), which uses the average entropy generated at different time intervals as the threshold, and then compares it with the entropy of current traffic. After simulating on MiniNet, we confirm that DDD5G detect simultaneous attacks, i.e., it can effectively self-detect and defend DDoS attacks without human intervention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. 5G security: IMT-2020(5G) promotion, China Academy of Information and Communications Technology. https://pdf.dfcfw.com/pdf/H3_AP202112141534538455_1.pdf?1639501401000.pdf

  2. Virmani, D., Taneja, S., Chawla, T., Sharma, R., Kumar, R.: Entropy deviation method for analyzing network intrusion. In: International Conference on Computing, Communication and Automation (ICCCA), April 2016, pp. 515–519 (2016)

    Google Scholar 

  3. Sahoo, K.S., Sahoo, B., Vankayala, M., Dash, R.: Detection of control layer DDoS attack using entropy metrics in SDN: an empirical investigation. In: The Ninth International Conference on Advanced Computing (ICoAC), December 2017, pp. 281–286 (2017)

    Google Scholar 

  4. Daneshgadeh, S., Ahmed, T., Kemmerich, T., Baykal, N.: Detection of DDoS attacks and flash events using shannon entropy, KOAD and Mahalanobis distance. In: 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), February 2019, pp. 222–229 (2019)

    Google Scholar 

  5. Mamolar, A.S., Pervez, Z., Calero, J.M.A., Khattak, A.M.: Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks. In: Computers and Security, November 2018, vol.79, pp. 132–147 (2018)

    Google Scholar 

  6. Information Entropy, Wikipedia. https://en.wikipedia.org/wiki/Entropy_(information_theory)

  7. Mininet. http://mininet.org/

Download references

Acknowledgments

This study is financial support in part by Ministry of Science and Technology, Taiwan under the grants MOST 108-2221-E-029-009 and MOST 109-2221-E-029-017-MY2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fang-Yie Leu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chiu, ST., Susanto, H., Leu, FY. (2022). Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy. In: Barolli, L. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2022. Lecture Notes in Networks and Systems, vol 496. Springer, Cham. https://doi.org/10.1007/978-3-031-08819-3_32

Download citation

Publish with us

Policies and ethics