skip to main content
10.1145/3290480.3290484acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data

Authors Info & Claims
Published:02 November 2018Publication History

ABSTRACT

Dozens of signature and anomaly based solutions have been proposed to detect malicious activities in computer networks. However, the number of successful attacks are increasing every day. In this paper, we developed a novel entropy based technique, called Edmund, to detect and mitigate Network attacks. While analyzing full payload network traffic was not recommended due to users' privacy, Edmund used netflow data to detect abnormal behavior.

The experimental results showed that Edmund was able to highly accurate detect (around 95%) different application, transport, and network layers attacks. It could identify more than 100K malicious flows raised by 1168 different attackers in our campus. Identifying the attackers, is a great feature, which enables the network administrators to mitigate DDoS effects during the attack time.

References

  1. Akamai. 2017. Akamai's Quarterly Reports on State of the Internet Security. (2017). https://www.akamai.com/us/en/our-thinking/state-of-theinternet-report/global-state-of-the-internet-security-ddosattack-reports.jspGoogle ScholarGoogle Scholar
  2. A. Bakshi and Y. B. Dujodwala. 2010. Securing cloud from DDoS attacks using intrusion detection system in virtual machine. In Communication Software and Networks, 2010. ICCSN'10. Second International Conference on. IEEE, 260--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. CTU. 2011. CTU-13 Botnet Traffic dataset. (2011). https://mcfp.weebly.com/the-ctu-13-dataset-a-labeleddataset-with-botnet-normal-and-background-traffic.htmlGoogle ScholarGoogle Scholar
  4. J. David and C. Thomas. 2015. DDoS attack detection using fast entropy approach on flow-based network traffic. Procedia Computer Science 50 (2015), 30--36.Google ScholarGoogle ScholarCross RefCross Ref
  5. C. Douligeris and A. Mitrokotsa. 2004. DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks 44, 5 (2004), 643--666. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris. 2014. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Computer Networks 62 (2014), 122--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Ioannidis and S. M. Bellovin. 2002. Implementing Pushback: Router-Based Defense Against DDoS Attacks.. In NDSS.Google ScholarGoogle Scholar
  8. J.-H. Jun, C.-W. Ahn, and S.-H. Kim. 2014. DDoS attack detection by using packet sampling and flow features. In proceedings of the 29th annual ACM symposium on applied computing. ACM, 711--712. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kaspersky-Labs. 2014. GLOBAL IT SECURITY RISKS SURVEY 2014 DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACKS. (2014). http://media.kaspersky.com/en/B2B-International-2014- Survey-DDoS-Summary-Report.pdfGoogle ScholarGoogle Scholar
  10. D. Linthicum. 2013. As cloud use grows so will rate of DDoS attacks. InfoWorld. February 5th (2013).Google ScholarGoogle Scholar
  11. A. M. Lonea, D. E. Popescu, and H. Tianfield. 2013. Detecting DDoS attacks in cloud computing environment. International Journal of Computers Communications & Control 8, 1 (2013), 70--78.Google ScholarGoogle ScholarCross RefCross Ref
  12. X. Ma and Y. Chen. 2014. DDoS detection method based on chaos analysis of network traffic entropy. IEEE Communications Letters 18, 1 (2014), 114--117.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. A. Mehdi, J. Khalid, and S. A. Khayam. 2011. Revisiting traffic anomaly detection using software defined networking. In International workshop on recent advances in intrusion detection. Springer, 161--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. E. Shannon. 1948. A mathematical theory of communication. Bell system technical journal 27, 3 (1948), 379--423. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. SPAMfighter-News. 2015. Survey - With DDoS Attacks Companies Lose around 100k/Hr. (2015). http://www.spamfighter.com/News-19554-Survey-WithDDoS-Attacks-Companies-Lose-around-100kHr.htmGoogle ScholarGoogle Scholar
  16. D. S. Terzi, R. Terzi, and S. Sagiroglu. 2017. Big data analytics for network anomaly detection from netflow data. In Computer Science and Engineering (UBMK), 2017 International Conference on. IEEE, 592--597.Google ScholarGoogle Scholar
  17. V. Vaidya. 2001. Dynamic signature inspection-based network intrusion detection. (Aug. 21 2001). US Patent 6,279,113.Google ScholarGoogle Scholar
  18. J. M. Vidal, A. L. S. Orozco, and L. J. G. Villalba. 2018. Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm and Evolutionary Computation 38 (2018), 94--108.Google ScholarGoogle ScholarCross RefCross Ref
  19. J. Wang, X. Yang, and K. Long. 2010. A new relative entropy based app-DDoS detection method. In Computers and Communications (ISCC), 2010 IEEE Symposium on. IEEE, 966--968. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Wang, Z. Jia, and L. Ju. 2015. An entropy-based distributed DDoS detection mechanism in software-defined networking. In Trustcom/BigDataSE/ISPA, 2015 IEEE, Vol. 1. IEEE, 310--317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Z. Xiao and Y. Xiao. 2013. Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials 15, 2 (2013), 843--859.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. Zhang, Z. Qin, L. Ou, P. Jiang, J. Liu, and A. X. Liu. 2010. An advanced entropybased DDOS detection scheme. In Information Networking and Automation (ICINA), 2010 International Conference on, Vol. 2. IEEE, V2--67.Google ScholarGoogle Scholar

Index Terms

  1. Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCNS '18: Proceedings of the 8th International Conference on Communication and Network Security
        November 2018
        166 pages
        ISBN:9781450365673
        DOI:10.1145/3290480

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 November 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader