A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic
Abstract
:1. Introduction
- -
- Taking into account the practical implementation of the SDN architecture, this study extends the recognition of packet-in attacks and flash crowds on the basis of prior research, thereby reducing false positives.
- –
- For different attack strengths, this method can make accurate judgment of the attack type possible and facilitate the subsequent targeted treatment of the attack.
- -
- By utilizing conditional entropy in conjunction with the existing method, the parameters for evaluating normal flows are expanded, thereby enhancing the detection accuracy.
- –
- The accuracy in judging traffic with similar characteristics is improved on the basis of existing methods.
- -
- The detection methods of the anomaly and signature types are combined to ensure that the difference between abnormal traffic with similar characteristics can be determined, while also providing protection against attacks that have not yet been identified.
2. Related Works
3. Proposed Method
3.1. Assumed Environment
3.1.1. SDN Environment
3.1.2. DDoS Attacks and Other Anomalous Traffic
3.2. DDoS Detection Method Using Conditional Entropy
3.2.1. Disorder State Based Attack Detection
3.2.2. Entropy and Conditional Entropy
Algorithm 1 Entropy calculation algorithm. |
|
Algorithm 2 Abnormal traffic determination algorithm. |
Require: a set of entropy values for normal traffic , total traffic , , , average , , , standard deviation , , |
Ensure: 0: attack, 1: normal |
|
3.2.3. Proposed Detection Method
- -
- When the mean entropy value is within , it is judged as normal.
- -
- When the mean entropy value is smaller than , it is judged as concentrated.
- -
- When the mean entropy value is larger than , it is judged as dispersive.
4. Numerical Analysis
4.1. Simulation Environment
4.2. Analysis and Evaluation
- -
- 1–25 s is normal traffic only
- -
- 26–54 s is both normal traffic and flash crowd traffic
- -
- 55–65 s is normal traffic only
- -
- 66–82 s is both normal traffic and ICMP flooding traffic
- -
- 83–112 s is normal traffic only
- -
- 113–144 s is both normal traffic and packet-in attack traffic
- -
- 145–150 s is normal traffic only
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chaganti, R.; Suliman, W.; Ravi, V.; Dua, A. Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks. Information 2023, 14, 41. [Google Scholar] [CrossRef]
- Otoum, Y.; Chamola, V.; Nayak, A. Federated and Transfer Learning-Empowered Intrusion Detection for IoT Applications. IEEE Internet Things Mag. 2022, 5, 50–54. [Google Scholar] [CrossRef]
- Nadeau, T.D.; Gray, K. SDN: Software Defined Networks: An Authoritative Review of Network Programmability Technologies; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2013. [Google Scholar]
- Flauzac, O.; González, C.; Hachani, A.; Nolot, F. SDN based architecture for IoT and improvement of the security. In Proceedings of the 2015 IEEE 29th International Vonference on Advanced Information Networking and Applications Workshops, Gwangju, Republic of Korea, 24–27 March 2015; pp. 688–693. [Google Scholar]
- Deepa, V.; Sudar, K.M.; Deepalakshmi, P. Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In Proceedings of the 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 13–14 December 2018; pp. 299–303. [Google Scholar]
- Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company. 1980. Available online: https://cir.nii.ac.jp/crid/1573950399661362176 (accessed on 9 April 2023).
- Li, L.; Zhou, J.; Xiao, N. DDoS attack detection algorithms based on entropy computing. In Proceedings of the Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, 12–15 December 2007; pp. 452–466. [Google Scholar]
- Lee, W.; Stolfo, S.J.; Mok, K.W. Mining in a data-flow environment: Experience in network intrusion detection. In Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Rio de Janeiro, Brazil, 20–24 May 2019; pp. 114–124. [Google Scholar]
- Carvalho, R.N.; Bordim, J.L.; Alchieri, E.A.P. Entropy-based DoS attack identification in SDN. In Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Rio de Janeiro, Brazil, 20–24 May 2019; pp. 627–634. [Google Scholar]
- Mao, J.; Deng, W.; Shen, F. DDoS flooding attack detection based on joint-entropy with multiple traffic features. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security Furthermore, Privacy in Computing Furthermore, Communications, New York, NY, USA, 1–3 August 2018; pp. 237–243. [Google Scholar]
- David, J.; Thomas, C. Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm. J. Parallel Distrib. Comput. 2021, 152, 79–87. [Google Scholar] [CrossRef]
- Ioulianou, P.; Vasilakis, V.; Moscholios, I.; Logothetis, M. A signature-based intrusion detection system for the internet of things. Inf. Commun. Technol. Form 2018, in press. [Google Scholar]
- Aldwairi, M.; Abu-Dalo, A.M.; Jarrah, M. Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework. EURASIP J. Inf. Secur. 2017, 2017, 9. [Google Scholar] [CrossRef]
- Kyaw, A.T.; Oo, M.Z.; Khin, C.S. Machine-Learning Based DDOS Attack Classifier in Software Defined Network. In Proceedings of the 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Phucket, Thailand, 24–27 June 2020; pp. 431–434. [Google Scholar]
- Huibin, J.; Liu, G.; Luo, D.; Jiang, H.; Wang, X.; Li, Y. A CGAN-based DDoS Attack Detection Method in SDN. In Proceedings of the IWCMC 2021, Harbin, China, 28 June–2 July 2021; pp. 1030–1034. [Google Scholar] [CrossRef]
- Kumar, V.; Sangwan, O.P. Signature based intrusion detection system using SNORT. Int. J. Comput. Appl. Inf. Technol. 2012, 1, 35–41. [Google Scholar]
- Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection: A survey. ACM Comput. Surv. CSUR 2009, 41, 1–58. [Google Scholar] [CrossRef]
- Dixit, A.; Hao, F.; Mukherjee, S.; Lakshman, T.; Kompella, R. Towards an elastic distributed SDN controller. ACM SIGCOMM Comput. Commun. Rev. 2013, 43, 7–12. [Google Scholar] [CrossRef]
- Karakus, M.; Durresi, A. A survey: Control plane scalability issues and approaches in software-defined networking (SDN). Comput. Netw. 2017, 112, 279–293. [Google Scholar] [CrossRef]
- Zhang, M.; Li, G.; Xu, L.; Bi, J.; Gu, G.; Bai, J. Control plane reflection attacks in SDNs: New attacks and countermeasures. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, Heraklion, Greece, 10–12 September 2018; pp. 161–183. [Google Scholar]
- Feinstein, L.; Schnackenberg, D.; Balupari, R.; Kindred, D. Statistical approaches to DDoS attack detection and response. In Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 22–24 April 2003; Volume 1, pp. 303–314. [Google Scholar]
- Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials 2013, 15, 2046–2069. [Google Scholar] [CrossRef]
- Bhardwaj, S.; Panda, S.N.; Datta, P. Layer-Based Attacks in the Ternary Planes of Software-Defined Networking. In Proceedings of the 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), Bhubaneswar, India, 15–16 November 2020; pp. 292–295. [Google Scholar] [CrossRef]
- Yu, S.; Thapngam, T.; Liu, J.; Wei, S.; Zhou, W. Discriminating DDoS flows from flash crowds using information distance. In Proceedings of the 2009 3d International Conference on Network and System Security, Gold Coast, Australia, October 2009; pp. 351–356. [Google Scholar]
- Thapngam, T.; Yu, S.; Zhou, W.; Beliakov, G. Discriminating DDoS attack traffic from flash crowd through packet arrival patterns. In Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 10–15 April 2011; pp. 952–957. [Google Scholar]
- Müter, M.; Asaj, N. Entropy-based anomaly detection for in-vehicle networks. In Proceedings of the 2011 IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany, 5–9 June 2011; pp. 1110–1115. [Google Scholar]
- You, X.; Feng, Y.; Sakurai, K. Packet in message based DDoS attack detection in SDN network using OpenFlow. In Proceedings of the 2017 Fifth International Symposium on Computing and Networking (CANDAR), Dresden, Germany, 14–18 June 2017; pp. 522–528. [Google Scholar]
- Oikonomou, G.; Mirkovic, J. Modeling human behavior for defense against flash-crowd attacks. In Proceedings of the 2009 IEEE International Conference on Communications, Singapore, 25–28 October 2009; pp. 1–6. [Google Scholar]
- Wang, H.; Zhang, D.; Shin, K.G. Detecting SYN flooding attacks. In Proceedings of the 25st Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 23–27 June 2002; Volume 3, pp. 1530–1539. [Google Scholar]
- Gao, D.; Liu, Z.; Liu, Y.; Foh, C.H.; Zhi, T.; Chao, H.C. Defending against Packet-In messages flooding attack under SDN context. Soft Comput. 2018, 22, 6797–6809. [Google Scholar] [CrossRef]
- Ahmed, M.; Mahmood, A.N.; Hu, J. A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 2016, 60, 19–31. [Google Scholar] [CrossRef]
- Chicco, D.; Jurman, G. The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genom. 2020, 21, 6. [Google Scholar] [CrossRef] [PubMed]
- Miyata, T.Q. Conditional entropy based DDoS Attack detection in Software Defined Network. IEICE Tech. Rep. 2022, 122, 1–6. [Google Scholar]
- Xuanyuan, M.; Ramsurrun, V.; Seeam, A. Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking. In Proceedings of the 2019 11th International Conference on Advanced Computing (ICoAC), Chennai, India, 18–20 December 2019; pp. 66–71. [Google Scholar]
- Aladaileh, M.A.; Anbar, M.; Hintaw, A.J.; Hasbullah, I.H.; Bahashwan, A.A.; Al-Sarawi, S. Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates. Appl. Sci. 2022, 12, 6127. [Google Scholar] [CrossRef]
- Swami, R.; Dave, M.; Ranga, V. Defending DDoS against software defined networks using entropy. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019; pp. 1–5. [Google Scholar]
Flash Crowds | Flooding Attack | Packet-in Attack | Normal Traffic | Others | |
---|---|---|---|---|---|
0 | 0 | 0 | 1 2 | - | |
1 | 0 | 1 | - | - | |
1 | 0 | 0 | - | - | |
Attack | 1 | 0 | 0 | 1 | 0 |
Type | S | S | S | A | A |
Normal Traffic | Flash Crowds | ICMP Flooding | Packet-in Attack | |
---|---|---|---|---|
Host number | 1–12 | 1–11 | 5–6 | ― |
Destination host number | 1–12 | 12 | 12 | ― |
Protocol | 85%TCP 10%UDP 5%ICMP | TCP | ICMP | UDP |
Size | random | random | 42 | random |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tian, Q.; Miyata, S. A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic. IoT 2023, 4, 95-111. https://doi.org/10.3390/iot4020006
Tian Q, Miyata S. A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic. IoT. 2023; 4(2):95-111. https://doi.org/10.3390/iot4020006
Chicago/Turabian StyleTian, Qiwen, and Sumiko Miyata. 2023. "A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic" IoT 4, no. 2: 95-111. https://doi.org/10.3390/iot4020006
APA StyleTian, Q., & Miyata, S. (2023). A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic. IoT, 4(2), 95-111. https://doi.org/10.3390/iot4020006