skip to main content
10.1145/1452520.1452539acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

An empirical evaluation of entropy-based traffic anomaly detection

Authors Info & Claims
Published:20 October 2008Publication History

ABSTRACT

Entropy-based approaches for anomaly detection are appealing since they provide more fine-grained insights than traditional traffic volume analysis. While previous work has demonstrated the benefits of entropy-based anomaly detection, there has been little effort to comprehensively understand the detection power of using entropy-based analysis of multiple traffic distributions in conjunction with each other. We consider two classes of distributions: flow-header features (IP addresses, ports, and flow-sizes), and behavioral features (degree distributions measuring the number of distinct destination/source IPs that each host communicates with). We observe that the timeseries of entropy values of the address and port distributions are strongly correlated with each other and provide very similar anomaly detection capabilities. The behavioral and flow size distributions are less correlated and detect incidents that do not show up as anomalies in the port and address distributions. Further analysis using synthetically generated anomalies also suggests that the port and address distributions have limited utility in detecting scan and bandwidth flood anomalies. Based on our analysis, we discuss important implications for entropy-based anomaly detection.

References

  1. Snort. http://www.snort.org.Google ScholarGoogle Scholar
  2. Argus. http://qosient.com/argus/.Google ScholarGoogle Scholar
  3. Barford, P., Kline, J., Plonka, D., and Ron, A. A signal analysis of network traffic anomalies. In Proc. of IMW (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Brauckhoff, D., Tellenbach, B., Wagner, A., Lakhina, A., and May, M. Impact of traffic sampling on anomaly detection metrics. In Proc. of ACM/USENIX IMC (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Feinstein, L., Schnackenberg, D., Balupari, R., and Kindred, D. Statistical Approaches to DDoS Attack Detection and Response. In Proc. of DARPA Information Survivability Conference and Exposition (2003).Google ScholarGoogle ScholarCross RefCross Ref
  6. Jung, J., Paxson, V., Berger, A. W., and Balakrishnan, H. Fast Portscan Detection Using Sequential Hypothesis Testing. In Proc. of the IEEE Symposium on Security and Privacy (2004).Google ScholarGoogle ScholarCross RefCross Ref
  7. Karamcheti, V., Geiger, D., Kedem, Z., and Muthukrishnan, S. Detecting malicious network traffic using inverse distributions of packet contents. In Proc. of ACM SIGCOMM MineNet (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kazaa. www.kazaa.com.Google ScholarGoogle Scholar
  9. Kumar, A., Sung, M., Xu, J., and Wang, J. Data streaming algorithms for efficient and accurate estimation of flow distribution. In Proc. of ACM SIGMETRICS (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lakhina, A., Crovella, M., and Diot, C. Mining anomalies using traffic feature distributions. In Proc. of ACM SIGCOMM (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lall, A., Sekar, V., Xu, J., Ogihara, M., and Zhang, H. Data streaming algorithms for estimating entropy of network traffic. In Proc. of ACM SIGMETRICS (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lee, W., and Xiang, D. Information-theoretic measures for anomaly detection. In Proc. of IEEE Symposium on Security and Privacy (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Morrison, J. Blaster revisited. ACM Queue vol. 2 no. 4, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Cisco Netflow. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml.Google ScholarGoogle Scholar
  15. Nychis, G., Sekar, V., Andersen, D. G., Kim, H., and Zhang, H. An Empirical Evaluation of Entropy-Based Traffic Anomaly Detection. Tech. Rep. CMU-CS-08-145, Computer Science Department, Carnegie Mellon University, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Phaal, P., Panchen, S., and Mckee, N. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Trammell, B., and Boschi, E. Bidirectional Flow Export Using IP Flow Information Export (IPFIX). RFC 5103, 2008.Google ScholarGoogle Scholar
  18. Wagner, A., and Plattner, B. Entropy Based Worm and Anomaly Detection in Fast IP Networks. In Proc. IEEE WET ICE (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Xu, J., Fan, J., Ammar, M. H., and Moon, S. B. Prefix-preserving IP Address Anonymization: Measurement-based Security Evaluation and New Cryptography-based Scheme. In Proc. of IEEE ICNP (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Xu, K., Zhang, Z., and Bhattacharyya, S. Profiling internet backbone traffic: Behavior models and applications. In Proc. of ACM SIGCOMM (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An empirical evaluation of entropy-based traffic anomaly detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IMC '08: Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
        October 2008
        352 pages
        ISBN:9781605583341
        DOI:10.1145/1452520

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 October 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate277of1,083submissions,26%

        Upcoming Conference

        IMC '24
        ACM Internet Measurement Conference
        November 4 - 6, 2024
        Madrid , AA , Spain

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader