吉林大学学报(工学版) ›› 2011, Vol. 41 ›› Issue (4): 1059-1064.

• paper • Previous Articles     Next Articles

DoS detection model base on alive entropy

LIU Yan-heng1,2, FU Feng1,2, ZHU Jian-qi1,2, SUN Xin1,2   

  1. 1.College of Computer Science and Technology, Jilin University, Changchun 130012,China|2.Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012,China
  • Received:2009-03-31 Online:2011-07-01 Published:2011-07-01

Abstract:

An alive entropy model is proposed for detecting increasingly serious Denial of Service (DoS) attacks. The model is based on the theory of active communication that combines the information entropy and related sessions of network flow. The model detects DoS attacks through the analysis of the variation of the network flow's alive entropy. Experiment result show that the alive entropy is stable under normal network flow, and when attack occurs it fluctuates obviously. Compared with other methods based on the static entropy model, the proposed model is more accurate and more effective in detecting unknown DoS attack.

Key words: computer systems organization, DoS attack detection, alive entropy, alive communication, information entropy

CLC Number: 

  • TP393
[1] DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[2] LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[3] DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[4] DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[5] YU He, QIN Gui-he, SUN Ming-hui, YAN Xin, WANG Xuan-zhe. Cyber security and anomaly detection method for in-vehicle CAN [J]. 吉林大学学报(工学版), 2016, 46(4): 1246-1253.
[6] LIU Hong,SUN Shuang-zi,WANG Qing-yuan,LI Yan-zhong. PSO based feature extraction method for analog circuit fault information [J]. 吉林大学学报(工学版), 2015, 45(2): 675-680.
[7] ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340.
[8] WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363.
[9] WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367.
[10] LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242.
[11] LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250.
[12] CHAI Zheng-yi, WU Hui-xin, WU-Yong. Optimization algorithm for immune real-value detector generation [J]. , 2012, 42(05): 1251-1256.
[13] LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing. Format-preserving encryption for variable-length encoding character data [J]. , 2012, 42(05): 1257-1261.
[14] KONG Fan-sen,WU Ya-fu,LI Cong. Assessment of fault diagnosis complexity about electrical fault diagnosis of equipment based on information entropy [J]. 吉林大学学报(工学版), 2011, 41(03): 697-701.
[15] SHI Wen-xiao,ZHAO Song,FAN Shao-shuai,SUN Chao. Multi-objective decision making based access selection algorithmin heterogeneous wireless networks [J]. 吉林大学学报(工学版), 2011, 41(03): 795-800.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!