DocumentCode
3192190
Title
An approach on detecting network attack based on entropy
Author
Wang, Zhiwen ; Xia, Qin
Author_Institution
Dept. of Comput. Sci. & Technol., Xi´´an Jiaotong Univ., Xi´´an, China
fYear
2011
fDate
20-23 March 2011
Firstpage
210
Lastpage
214
Abstract
There are a large amounts of alerts with high false rate in typical Intrusion Detection System (IDS). The problem about how to identify network attack effectively from huge volume of alerts is becoming a challenging task for security administrators. It gets worse with larger scale of network being monitored by IDS. In this paper we propose an approach on detecting network attack based on entropy from millions of alerts. Shannon entropy is developed firstly to analyze the distribution characteristics of alert with five key attributes including source IP address, destination IP address, source threat, destination threat and datagram length. Then, the Renyi cross entropy is employed to fuse the Shannon entropy vector and detect the anomalies. The IDS used in our experiment is Snort, and the experimental results based on actual network data show that our approach can detect network attack quickly and accurately.
Keywords
IP networks; computer network security; entropy; Renyi cross entropy; Shannon entropy vector; Snort; alert distribution characteristics; anomaly detection; datagram length; destination IP address; destination threat; intrusion detection system; network attack detection; network monitoring; security administration; source IP address; source threat; Entropy; IP networks; Intrusion detection; Monitoring; Training; Training data; IDS; network securiy; renyi entropy; shannon entropy;
fLanguage
English
Publisher
ieee
Conference_Titel
Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2011 IEEE International Conference on
Conference_Location
Kunming
Print_ISBN
978-1-61284-910-2
Type
conf
DOI
10.1109/CYBER.2011.6011795
Filename
6011795
Link To Document