CFP last date
20 May 2024
Reseach Article

Low-rate DDOS Attack Detection using Optimal Objective Entropy Method

by Poonam N. Jadhav, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 3
Year of Publication: 2013
Authors: Poonam N. Jadhav, B. M. Patil
10.5120/13472-1147

Poonam N. Jadhav, B. M. Patil . Low-rate DDOS Attack Detection using Optimal Objective Entropy Method. International Journal of Computer Applications. 78, 3 ( September 2013), 33-38. DOI=10.5120/13472-1147

@article{ 10.5120/13472-1147,
author = { Poonam N. Jadhav, B. M. Patil },
title = { Low-rate DDOS Attack Detection using Optimal Objective Entropy Method },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 3 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number3/13472-1147/ },
doi = { 10.5120/13472-1147 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:41.495735+05:30
%A Poonam N. Jadhav
%A B. M. Patil
%T Low-rate DDOS Attack Detection using Optimal Objective Entropy Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 3
%P 33-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Distributed Denial of Service (DDOS) attack is a type of Internet attack that disrupts the normal function of the targeted computer network (server). This kind of attacks attempts to make target host resource unavailable to its legal users. Several efforts had made in detection and computation of the DDOS attacks over network, where IDS (Intrusion detection systems) are unable to isolate the normal flow of traffic from attacks. So this paper is an introduction of the optimal objective entropy (OOE) based method to detect low-rate DDOS attacks. Minimization of objective function in entropy based method show considerable improvement over the traditional entropy based schemes.

References
  1. Suratose Tritilanunt, Suphannee Sivakorn, Choochern Juengjincharoen, Ausanee Siripornpisan, "Entropy-based Input-Output Traffic Mode Detection Scheme for DoS/DDoS Attacks," Mahidol University, Thailand
  2. Aleksandar Kuzmanovic and Edward W. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies"
  3. Jie Zhang, Zheng Qin, Lu Ou, Pei Jiang , JianRong Liu and Alex X. Liu, "An Advanced Entropy-Based DDOS Detection Scheme," 2010 International Conference on Information, Networking and Automation (ICINA)
  4. V. Sus hma Reddy, K. Damodar Rao, P. Sowmya Laks hmi, "Efficient Detection of DDoS Attacks by Entropy Variation," IOSR Journal of Computer Engineering (IOSRJCE), ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18
  5. Aditya Akella, Ashwin Bharambe, Mike Reiter, Srinivasan Seshan,"Detecting DDoS Attacks on ISP Networks," Carnegie Mellon University
  6. Ming Li, Jun Li and Wei Zhao, "Experimental Study of DDoS Attacking of Flood Type Based on NS2," International Journal of Electronics and Computers, 1(2) December 2009, pp. 143-152
  7. N. Jeyanthi and N. Ch. Sriman Narayana Iyengar, "An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks," International Journal of Network Security, Vol. 14, No. 5, PP. 257-269, Sept. 2012
  8. Reyhaneh Karimazad and Ahmad Faraahi," An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks" 2011 International Conference on Network and Electronics Engineering IPCSIT vol. 11 (2011) © (2011) IACSIT Press, Singapore
  9. Rejo Mathew and Vijay Katkar,"Software based Low Rate DDoS Attack Detection Mechanism," International Journal of Computer Applications (0975 – 8887) Volume 20– No. 6, April 2011
  10. Yang Xiang, Ke Li, and Wanlei Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 2, JUNE 2011
  11. H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, pp. 1530- 1539, 2002.
  12. C. M. Cheng, H. T. Kung, and K. S. Tan, "Use of spectral analysis in defense against DoS attacks," in Proc. IEEE GLOBECOM, pp. 2143-2148, 2002.
  13. A. Kulkarni and S. Bush, "Detecting distributed denial-of-service attacks using kolmogorov complexity metrics," Journal of Network and Systems Management, vol. 14, pp. 69-80, 2006.
  14. U. Deepak, "Optimization of Milling Operation Using Genetic and PSO Algorithm," Bonfring International Journal of Software Engineering and Soft Computing, Vol. 1, Special Issue, December 2011
Index Terms

Computer Science
Information Sciences

Keywords

Optimal Objective Entropy (OOE) Intrusion Detection System (IDS).