Suppr超能文献

利用熵和序贯概率比检验方法的组合识别分布式拒绝服务异常。

Identification of Distributed Denial of Services Anomalies by Using Combination of Entropy and Sequential Probabilities Ratio Test Methods.

机构信息

Department of Electrical and Electronic Engineering, Faculty of Engineering, Universiti Putra Malaysia, Serdang 43400, Malaysia.

Department of Computer Engineering, Al-Iraqia University, Baghdad 10054, Iraq.

出版信息

Sensors (Basel). 2021 Sep 27;21(19):6453. doi: 10.3390/s21196453.

Abstract

One of the most dangerous kinds of attacks affecting computers is a distributed denial of services (DDoS) attack. The main goal of this attack is to bring the targeted machine down and make their services unavailable to legal users. This can be accomplished mainly by directing many machines to send a very large number of packets toward the specified machine to consume its resources and stop it from working. We implemented a method using Java based on entropy and sequential probabilities ratio test (ESPRT) methods to identify malicious flows and their switch interfaces that aid them in passing through. Entropy (E) is the first technique, and the sequential probabilities ratio test (SPRT) is the second technique. The entropy method alone compares its results with a certain threshold in order to make a decision. The accuracy and F-scores for entropy results thus changed when the threshold values changed. Using both entropy and SPRT removed the uncertainty associated with the entropy threshold. The false positive rate was also reduced when combining both techniques. Entropy-based detection methods divide incoming traffic into groups of traffic that have the same size. The size of these groups is determined by a parameter called window size. The Defense Advanced Research Projects Agency (DARPA) 1998, DARPA2000, and Canadian Institute for Cybersecurity (CIC-DDoS2019) databases were used to evaluate the implementation of this method. The metric of a confusion matrix was used to compare the ESPRT results with the results of other methods. The accuracy and f-scores for the DARPA 1998 dataset were 0.995 and 0.997, respectively, for the ESPRT method when the window size was set at 50 and 75 packets. The detection rate of ESPRT for the same dataset was 0.995 when the window size was set to 10 packets. The average accuracy for the DARPA 2000 dataset for ESPRT was 0.905, and the detection rate was 0.929. Finally, ESPRT was scalable to a multiple domain topology application.

摘要

一种影响计算机的最危险的攻击之一是分布式拒绝服务 (DDoS) 攻击。这种攻击的主要目标是使目标机器瘫痪,并使其服务对合法用户不可用。这主要可以通过指示许多机器向指定机器发送大量数据包来实现,以消耗其资源并使其停止工作。我们使用基于 Java 的方法实现了一种使用熵和序列概率比检验 (ESPRT) 方法来识别恶意流量及其通过的交换接口的方法。熵 (E) 是第一种技术,而序列概率比检验 (SPRT) 是第二种技术。熵方法本身将其结果与某个阈值进行比较,以做出决策。因此,当阈值发生变化时,熵结果的准确性和 F 分数会发生变化。当同时使用熵和 SPRT 时,消除了与熵阈值相关的不确定性。当结合使用两种技术时,假阳性率也会降低。基于熵的检测方法将传入流量分为具有相同大小的流量组。这些组的大小由一个称为窗口大小的参数确定。防御高级研究计划局 (DARPA) 1998 年、DARPA2000 年和加拿大网络安全研究所 (CIC-DDoS2019) 数据库被用于评估该方法的实施情况。混淆矩阵的度量标准用于将 ESPRT 结果与其他方法的结果进行比较。当窗口大小设置为 50 和 75 个数据包时,ESPRT 方法在 DARPA 1998 数据集上的准确率和 F 分数分别为 0.995 和 0.997。对于同一数据集,ESPRT 的检测率为 0.995,当窗口大小设置为 10 个数据包时。ESPRT 在 DARPA 2000 数据集上的平均准确率为 0.905,检测率为 0.929。最后,ESPRT 可扩展到多域拓扑应用程序。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc04/8512025/ca2eb99b4ae8/sensors-21-06453-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验