DocumentCode :
3192190
Title :
An approach on detecting network attack based on entropy
Author :
Wang, Zhiwen ; Xia, Qin
Author_Institution :
Dept. of Comput. Sci. & Technol., Xi´´an Jiaotong Univ., Xi´´an, China
fYear :
2011
fDate :
20-23 March 2011
Firstpage :
210
Lastpage :
214
Abstract :
There are a large amounts of alerts with high false rate in typical Intrusion Detection System (IDS). The problem about how to identify network attack effectively from huge volume of alerts is becoming a challenging task for security administrators. It gets worse with larger scale of network being monitored by IDS. In this paper we propose an approach on detecting network attack based on entropy from millions of alerts. Shannon entropy is developed firstly to analyze the distribution characteristics of alert with five key attributes including source IP address, destination IP address, source threat, destination threat and datagram length. Then, the Renyi cross entropy is employed to fuse the Shannon entropy vector and detect the anomalies. The IDS used in our experiment is Snort, and the experimental results based on actual network data show that our approach can detect network attack quickly and accurately.
Keywords :
IP networks; computer network security; entropy; Renyi cross entropy; Shannon entropy vector; Snort; alert distribution characteristics; anomaly detection; datagram length; destination IP address; destination threat; intrusion detection system; network attack detection; network monitoring; security administration; source IP address; source threat; Entropy; IP networks; Intrusion detection; Monitoring; Training; Training data; IDS; network securiy; renyi entropy; shannon entropy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2011 IEEE International Conference on
Conference_Location :
Kunming
Print_ISBN :
978-1-61284-910-2
Type :
conf
DOI :
10.1109/CYBER.2011.6011795
Filename :
6011795
Link To Document :
بازگشت