Skip to main content

DDoS Detection Method Based onĀ Improved Generalized Entropy

  • Conference paper
  • First Online:
Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2022)

Abstract

With the rapid development of network technology, network security is facing serious problems. Distributed Denial of Service (DDoS) attack is one of the most difficult security threats to guard against. In this paper, we propose a DDoS detection method based on improved generalized entropy. The model includes a preliminary detection module based on improved generalized entropy and a DDoS detector based on deep neural networks (DNN). The preliminary detection module filters as much normal traffic as possible while ensuring the accuracy of the model by calculating the generalized entropy threshold of the traffic. The DNN-based DDoS detector takes the filtered data as input and detects DDoS attacks more accurately. The experimental results show that the method achieves more than 99% accuracy, precision, and recall on the dataset of this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, Jian, Purui, Su., Yang, Min, He, Liang, Zhang, Yuan, Zhu, Xueyang, Lin, Huimin: Software and cyber securityā€”a survey. J. Softw. 29(1), 42ā€“68 (2018)

    Google ScholarĀ 

  2. Wang, A., Chang, W., Chen, S., Mohaisen, A.: Delving into internet DDoS attacks by botnets. IEEE/ACM Trans. Networking (TON) 26(6), 2843ā€“2855 (2018)

    ArticleĀ  Google ScholarĀ 

  3. Liu, X., Ren, J., He, H., et al.: Low-rate DDoS attacks detection method using data compression and behavior divergence measurement. Comput. Secur. 100, 102107 (2021)

    Google ScholarĀ 

  4. Luo, W., Cheng, J.: Hybrid DDoS attack distributed detection system based on hadoop architecture. Netinfo Secur. 21(2), 61ā€“69 (2021)

    Google ScholarĀ 

  5. Chen, M., Chen, J., Wei, X., et al.: Is low-rate distributed denial of service a great threat to the internet. IET Inf. Secur. 15(5), 351ā€“363 (2021)

    ArticleĀ  Google ScholarĀ 

  6. Tang, D., Feng, Y., Zhang, S., et al.: Fr-red: fractal residual based real-time detection of the LDoS attack. IEEE Trans. Reliab. 70(3), 1143ā€“1157 (2021)

    ArticleĀ  Google ScholarĀ 

  7. Yuhua, X., Sun, Z.: Research development of abnormal traffic detection in software defined networking. J. Softw. 31(01), 183ā€“207 (2020)

    Google ScholarĀ 

  8. Ding, D., Savi, M., Siracusa, D.: Tracking normalized network traffic entropy to detect DDoS attacks in P4. IEEE Trans. Dependable Secure Comput 1ā€“1 (2021)

    Google ScholarĀ 

  9. Giray, G.: A software engineering perspective on engineering machine learning systems: state of the art and challenges. J. Syst. Softw. 180, 111031 (2021)

    ArticleĀ  Google ScholarĀ 

  10. Tang, D., Tang, L., Dai, R., et al.: MF-adaboost: LDoS attack detection based on multi-features and improved adaboost. Future Gener. Comput. Syst. 106, 347ā€“359 (2020)

    ArticleĀ  Google ScholarĀ 

  11. Nazih. W., Hifny, Y., Elkilani, W.S., et al.: Countering DDoS attacks in SIP based VoIP networks using recurrent neural networks. Sensors 20(20), 5875 (2020)

    Google ScholarĀ 

  12. Alekseev, I.V.: Detection of distributed denial of service attacks in large-scale networks based on methods of mathematical statistics and artificial intelligence. Autom. Control Comput. Sci. 54(8), 952ā€“957 (2020)

    ArticleĀ  Google ScholarĀ 

  13. Zhao, S., Chen, S.: Review: traffic identification based on machine learning. Comput. Eng. Sci. 40(10), 1746ā€“1756 (2018)

    Google ScholarĀ 

  14. Haghighat, M.H., Jun, L.: Intrusion detection system using voting-based neural network. Tsinghua Sci. Technol. 26(4), 484ā€“495 (2021)

    Google ScholarĀ 

  15. Xiang, Y., Li, K., Zhou, W.: Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans. Inf. Forensics Secur. 6(2), 426ā€“437 (2011)

    ArticleĀ  Google ScholarĀ 

  16. CSE-CIC-IDS2018 on AWS. https://www.unb.ca/cic/datasets/ids-2018.html. Accessed 10 June 2022

  17. Intrusion Detection Evaluation Dataset (CIC-IDS2017). https://www.unb.ca/cic/datasets/ids-2017.html. Accessed 10 June 2022

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China (Grant No.62072109, and No.U1804263), the Natural Science Foundation of Fujian Province(Grant No.2021J01625, No.2021J01616), Major Science and Technology project of Fujian Province(Grant No.2021HZ0115).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jiaqi Li or Yanhua Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, J., Yang, X., Chen, H., Lin, H., Chen, X., Liu, Y. (2023). DDoS Detection Method Based onĀ Improved Generalized Entropy. In: Xiong, N., Li, M., Li, K., Xiao, Z., Liao, L., Wang, L. (eds) Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery. ICNC-FSKD 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 153. Springer, Cham. https://doi.org/10.1007/978-3-031-20738-9_59

Download citation

Publish with us

Policies and ethics