Next Article in Journal
Secure Adaptive Context-Aware ABE for Smart Environments
Previous Article in Journal
Evaluating Consumer Behavior, Decision Making, Risks, and Challenges for Buying an IoT Product
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic

Department of Electrical Engineering and Computer Science, Shibaura Institute of Techonology, 3-7-5 Toyosu, Koto-ku, Tokyo 135-8548, Japan
*
Author to whom correspondence should be addressed.
IoT 2023, 4(2), 95-111; https://doi.org/10.3390/iot4020006
Submission received: 16 February 2023 / Revised: 28 March 2023 / Accepted: 30 March 2023 / Published: 12 April 2023

Abstract

:
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a certain degree of order. However, with the increasing complexity of networks and the diversity of attack types, existing studies use a single entropy, which does not discriminate correctly between attacks and normal traffic and may lead to false positives. In this paper, we propose new state determination standards that use the normal distribution characteristics of the entropy value at the time which an attack did not occur, subdivide the normal and abnormal range represented by the entropy value, improving the accuracy of attack determination. Furthermore, we show the effectiveness of the proposed method by numerical analysis.

1. Introduction

In recent years, as sensors become smaller and more energy efficient and networks become more diverse, the Internet of Things (IoT) [1] is being more widely used in various fields. As a result of connecting various “things” to the Internet, traffic increases due to the transmission of real-time data and status confirmation messages, making the composition of the network increasingly complex. Therefore, flexibility in various network environments is a challenge in designing new network architectures [2]. Conventional networks cannot be centrally managed by administrators because routers, switches, firewalls, etc., must be changed individually when servers or network devices are added or the network configuration is changed. To solve these problems, the concept of an SDN (software-defined network), “network virtualization,” in which the entire network is controlled by software, has become popular [3]. The most prominent feature of an SDN is the separation of the data and control planes, i.e., the “transmission function” and the “control function” are implemented by different network devices. Therefore, network devices in the data plane do not send messages to each other to share the network status but only forward packets. On the other hand, the SDN controller in the control plane manages the entire network and can quickly change and update network settings according to traffic conditions. By leveraging the characteristics of an SDN network, an IoT environment with complex networks such as sensor networks, wireless networks, etc., can also achieve unified network management [4].
However, one of the most pressing concerns in the realm of IoT security is the threat of Distributed Denial of Service (DDoS) attacks, which can cause significant disruption to IoT networks and systems. DDoS attacks involve overwhelming a network with traffic from multiple sources, rendering it inaccessible and disrupting normal operations. The potential consequences of a successful DDoS attack on an IoT network can be severe, ranging from data loss and theft to physical harm and even loss of life in critical infrastructure environments such as healthcare, transportation, and energy. The impact of these attacks can be amplified by the sheer scale and complexity of IoT networks, which often involve multiple devices and layers of connectivity. Moreover, many IoT devices are designed with limited security features, making them easy targets for attackers. To this end, a growing body of research is focused on developing new security mechanisms and techniques that can protect IoT networks and systems from DDoS attacks. These include approaches such as machine learning-based anomaly detection, intrusion detection and prevention, and network-based defense mechanisms.
Additionally, in the SDN environment, with the separation of the “transmission function” and the “control function”, attacks on the control plane will become even more valuable than those on the data plane, which merely transfers data [5]. Attackers can target the SDN controller and send a large number of request messages from data plane devices to make the SDN controller inoperable. Therefore, it is necessary to detect attacks not only by considering attack methods that have been used in conventional architectures but by also considering new attack methods that have been introduced in SDN architectures.
The IDS (intrusion detection system) [6] is a system that detects attacks such as those described above. In general, an IDS collects traffic information such as IP addresses and port numbers in advance for intrusion detection. It then defines attack patterns, which are traffic sets that match attack communications, and normal patterns, which are traffic sets that match normal communications. For example, Figure 1 assumes that users and servers communicate via an external network. In this case, the green arrows represent the traffic between the server and user, and the IDS acquires and analyses this traffic to determine normal and abnormal communication.
As shown in Figure 2, an IDS can be broadly classified into two types: the signature type, in which a new communication is judged on the basis of whether it matches an attack pattern; and the anomaly type, in which it is judged on the basis of whether it matches a normal pattern [7]. Each red arrow represents an attack pattern extracted from conventional attacks on the system, and the blue arrows are the ranges determined by referring to normal traffic. In other words, the signature type judges traffic to be an attack communication when it matches the red attack pattern in the figure. The anomaly type defines a normal pattern and determines an attack to be occurring when traffic that differs from the normal range occurs. Since the anomaly type has the advantage of being able to detect unknown attacks outside the normal range, many studies have been conducted [8,9,10].
However, previous entropy methods [9], when implemented in SDN environments, should also consider attacks on the control plane on the basis of the SDN architecture features. However, there are only entropy detection methods for flooding attacks in existing methods.
The normal traffic range in the anomaly type is also important. As shown in Figure 3, false positives can occur if the normal traffic range is too large or too small compared with the actual normal traffic range. For example, when an event is held, there could be a network failure due to a flash crowd, which is a rapidly increasing number of accesses [11]. In such a case, the traffic may be considered to be attack traffic even though it is normal traffic. In other words, to apply the entropy method to an SDN, the range of normal traffic should be re-examined after fully considering the changes in the network structure caused by the SDN.
In this study, we propose an attack detection method using conditional entropy based on the anomaly-based entropy method, which takes into account the changes in the network structure due to an SDN and multiple traffic factors, such as flash crowds. In addition, by focusing on traffic outside the set normal traffic range, such as a flash crowd, we use a signature-based detection method to define the normal traffic range by determining the type of normal traffic and attack traffic with similar characteristics.
The contributions of this study are summarized below.
-
Taking into account the practical implementation of the SDN architecture, this study extends the recognition of packet-in attacks and flash crowds on the basis of prior research, thereby reducing false positives.
For different attack strengths, this method can make accurate judgment of the attack type possible and facilitate the subsequent targeted treatment of the attack.
-
By utilizing conditional entropy in conjunction with the existing method, the parameters for evaluating normal flows are expanded, thereby enhancing the detection accuracy.
The accuracy in judging traffic with similar characteristics is improved on the basis of existing methods.
-
The detection methods of the anomaly and signature types are combined to ensure that the difference between abnormal traffic with similar characteristics can be determined, while also providing protection against attacks that have not yet been identified.
The remainder of this paper is organized as follows. Section 2 describes related research in DDoS attack detection, and Section 3 defines conditional entropy and describes the data processing procedure for the proposed method. Section 4 presents a numerical analysis, and Section 5 summarizes and discusses problems and issues in this study.

2. Related Works

As described in the previous section, detection methods can be divided into two types: signature-type methods [12,13], which determine an attack by matching the attack traffic pattern; and anomaly-type methods [8,9,10,14,15], which determine an attack by matching the normal traffic pattern.
In the former attack detection method, attack patterns are registered one by one in advance, and when attack traffic occurs, the signatures of the predefined attack patterns are checked to determine whether the traffic is an attack or not [16]. The advantage of this method is that it is based on attack patterns that have been experienced in the past, and control can be achieved through clarified characteristics. However, it has the disadvantage that when a new attack occurs, it is judged as normal because it does not match an attack signature. An attack traffic list needs to be stored, updated, and maintained, which increases the processing load. P. Ioulianou et al. [12] proposed signature-based intrusion detection to deal with two variations of DDoS attacks. The simulation outcomes demonstrated that these attacks may affect the reachability of specific IoT devices and their energy consumption. M. Aldwairi et al. [13] proposed facing the problem of significant overheads due to memory usage and execution time due to the signature pattern matching operation by parallelizing the process on a multi-core CPU.
The latter method defines a normal pattern and determines whether or not a pattern is an attack. This method determines illegal communication by comparing traffic with the defined pattern. In other words, it is not necessary to include all attacks; unknown attacks can be detected after defining normal patterns, which is an advantage of the anomaly-type method. On the other hand, if there is a mistake in the definition of the normal pattern, or if anomalous traffic similar to the normal pattern occurs, false positives are likely to occur. Currently, many studies are focusing on the anomaly-type method and using statistical, neural network, machine learning, and other methods to reduce the false positive rate while consolidating the range of normal patterns [17]. Kyaw et al. [14] proposed a method that increases the detection rate of DoS flooding attacks by switching to a polynomial SVM algorithm over the traditional linear SVM algorithm. Liu et al. [15] proposed a method using a CGAN neural network algorithm focusing on fast flooding attacks. Carvalho et al. [9] computed entropy using a target IP as the only tick. They proposed a method for defining a normal pattern with reference to the change in entropy. However, since SDNs have more attack patterns than conventional networks, the probability of false positives increases if the decision is based solely on the target IP.
Based on the existing entropy method [9], we introduce conditional entropy based not only on the target IP but also on the actual attack features, so that we can understand the changes of the entire network in a multidimensional manner. In terms of defining patterns, we use anomaly-type methods that define normal patterns among all traffic in combination with signature-type methods that define similar patterns for each of them, in order to avoid false positives while maintaining detection rates based on the diversity of normal patterns.

3. Proposed Method

3.1. Assumed Environment

3.1.1. SDN Environment

In SDNs, two types of planes are used to separate data transfer and control functions: a data plane for data transfer and a control plane for centralized management. The data plane is the part of the network equipment that performs the data forwarding process. Unlike conventional network devices, the OpenFlow switch in an SDN only accepts routing information from the SDN controller; thus, it only searches for the destination of received packets in a table, determines the destination, and forwards the packet. If the destination does not exist in the table, the OpenFlow switch sends a packet-in message to the SDN controller saying that a new packet is arriving, and the SDN controller decides how to process the packet before sending another message to the OpenFlow switch informing the switch of the processing method for the packet [18].
On the other hand, the control plane controls the data plane. It can centrally control the entire network and plays the role of creating and controlling routing information, such as routing tables and MAC address tables, necessary for forwarding data [19].
For these reasons, both the SDN controller and OpenFlow switch are indispensable for building an SDN. However, in an SDN, since the SDN controller centrally manages the directed traffic, attacks on the control plane belonging to the SDN controller are more valuable from an attacker’s point of view [20].

3.1.2. DDoS Attacks and Other Anomalous Traffic

Before explaining the proposed attack detection method, we first explain the working principle and characteristics of DDoS attacks. A DDoS attack is an attacker launching a simultaneous attack on a specific server using multiple devices. The goal of this attack is to abnormally increase traffic and stop server functions [21]. Since the number of attacker devices is larger than that of conventional DoS attacks, the damage is larger than that of conventional DoS attacks. Specifically, the name of the attack can be classified as SYN ACK flooding, UDP flooding, or ICMP flooding depending on “which part” of the mechanism the attack uses to send messages [22].
In particular, a new DDoS attack called a packet-in attack exists against the SDN architecture focused on in this study [23]. The packet-in attack is an attack that increases the number of packet-in messages sent to the SDN controller by the OpenFlow switch, which cannot refer to a routing table, by sending a large number of fake packets to an IP for which the attacker does not exist. The purpose of this attack is to cause the controller to lose control of the SDN network by abnormally increasing the number of packet-in messages.
On the other hand, flash crowds [24], which are similar to DDoS attacks, are accesses to servers caused by events that increase people’s interest, such as bargain sales and the World Cup. For example, the number of user accesses to a particular web site may increase so much in a short period of time that some users are denied access as legitimate [25]. The result is the same as a DDoS attack, despite it not being an attack.

3.2. DDoS Detection Method Using Conditional Entropy

3.2.1. Disorder State Based Attack Detection

In this research, we propose an attack detection method based on the “state of disorder”. Here, “state of disorder” means whether the traffic parameters are random or not during a certain time period, as shown in Figure 4. For example, if parameters such as the destination IP and source IP of packets generated during a certain time period are concentrated at the same value, an attack may be occurring [26]. We introduce entropy to quantify the degree of concentration.
In a normal usage environment, there exists a certain correlation between various parameters of data packets based on user operations and business requests, while a single entropy can reflect the degree of dispersion of a single parameter, it cannot represent the overall situation of multiple parameters. As depicted in Figure 5, the occurrence frequency of destination IP addresses and source ports for 10 packets within 1 and 2 s are the same, and calculating the single entropy of the two parameters will yield identical results. However, it cannot indicate the complete consistency of the two parameters in combination. Therefore, in this study, we introduced conditional entropy as a measure of the uncertainty of multiple parameters as a whole.

3.2.2. Entropy and Conditional Entropy

In this study, we use entropy and conditional entropy together to quantify the degree of concentration of each parameter of the traffic at the observed time of T seconds. As shown in Algorithm 1, first, the collected packets are sorted in order of arrival, and these data are divided into N pieces. Let W = W 1 , W 2 , W N be the set of these divided data. For each W i , i N = { 1 , 2 , , N } of this dataset, m packets are randomly selected, and the selected set is redefined as window W i = a 1 i , a 2 i , , a m i . In each window W i , the number D i of different IP addresses d j , 1 j D i , S i of different source port numbers s j , 1 j S i , L i and L i of different packet sizes l j , 1 j L i are expressed in the form of set D i , S i , and L i .
The probability p i , j di of the occurrence of the target IP d j in each window W i is calculated as follows, and f j di is the number of occurrences of each objective IP in window i.
p i , j di = f j di m , i N , j D i
Then, using the probability p i , j di , 1 j D i of the target IP, the entropy H i di , i N of the target IP is calculated as follows.
H i di = j = 1 D i p i , j di log 2 p i , j di
To clarify the type of abnormal traffic, the conditional probability p i , j , k sp , p i , j , n ps of the source port and packet size for a given destination IP is calculated using the following equation with condition 1 k S i , 1 n L i , 1 j D i .
p i , j , k sp : = P ( s k | d j ) , s k S i , d j D i
p i , j , n ps : = P ( l n | d j ) , l n L i , d j D i
Using the obtained conditional probabilities, the conditional entropy of the source port and packet size for a given destination IP is obtained by the following equation.
H i sp = j = 1 D i p i , j di k = 1 S i p i , j , k sp log 2 p i , j , k sp i N
H i ps = j = 1 D i p i , j di n = 1 L i p i , j , n ps log 2 p i , j , n ps i N
Algorithm 1 Entropy calculation algorithm.
1:
For the collected data packets, classify the data packets that occur at the same second and randomly select m put into the window W i , i N .
2:
Classify the different destination IP addresses, source port, and packet size in set W i as D i , S i , L i .
3:
Calculate the probability p j di , p j k sp , p j n ps according to Equations (1), (3) and (4). Then, calculate the entropy whose output is H i di , H i sp , H i ps according to Equations (2), (5) and (6).
4:
These steps stop if the predefined loop N is reached; otherwise, they return to step 2.
Algorithm 2 Abnormal traffic determination algorithm.
Require: a set of entropy values for normal traffic W t , total traffic W i , W t W i , i , t N , average H di ¯ , H sp ¯ , H ps ¯ , standard deviation σ di , σ sp , σ ps
Ensure: 0: attack, 1: normal
1:
for each W i , i N  do
2:
    if  H di ¯ + 2 σ di < H i di  then
3:
        Traffic type Normal traffic
4:
        return 1
5:
    end if
6:
    if  H di ¯ 2 σ di H i di H di ¯ + 2 σ di  then
7:
        Traffic type Normal traffic
8:
        return 1
9:
    end if
10:
    if  H di ¯ 2 σ di > H i di  then
11:
        if  H sp ¯ + 2 σ sp < H i sp and H ps ¯ + 2 σ ps < H i ps  then
12:
           Traffic type Flash Crowd
13:
           return 1
14:
        end if
15:
        if  H sp ¯ 2 σ sp > H i sp and H ps ¯ 2 σ ps > H i ps  then
16:
           Traffic type Flooding Attack
17:
           return 0
18:
        end if
19:
        if  H sp ¯ + 2 σ sp < H i sp and H ps ¯ 2 σ ps > H i ps  then
20:
           Traffic type Packet in Attack
21:
           return 0
22:
        end if
23:
    else
24:
        Traffic type Unknown attack
25:
        return 0
26:
    end if
27:
end for

3.2.3. Proposed Detection Method

As shown in Algorithm 2, to determine if an attack is occurring, we first determine the average entropy H di ¯ , H sp ¯ , H ps ¯ and the standard deviation σ di , σ sp , σ ps of each entropy in the window W t W , t N during which no attack is occurring.
Additionally, the entropy of each packet at the same window size follows an approximately normal distribution [27]. As is well-known, for variables that conform to a normal distribution, the data within one standard deviation accounts for 68.26 % and within two standard deviations accounts for 95.45 % . Therefore, this paper employs the mean value of the three types of entropy in the normal state at each time point, along with a system threshold of two times the standard deviation, to measure the degree of disorder for the three parameters at each time point. This approach minimizes errors that may arise from sampling randomness and effectively reduces the computational workload for each time point. The quantification is defined as follows:
-
When the mean entropy value is within H ¯ ± 2 σ , it is judged as normal.
-
When the mean entropy value is smaller than H ¯ 2 σ , it is judged as concentrated.
-
When the mean entropy value is larger than H ¯ + 2 σ , it is judged as dispersive.
As shown in Figure 6. Using the three types of states defined, an attack decision is made on the basis of the characteristics of the abnormal traffic. Initially, anomaly-type methods are used to determine the range of normal traffic.
Therefore, as shown in Table 1, if H i di in window W i , i N satisfies condition H di ¯ + 2 σ di < H i di , or H di ¯ 2 σ di H i di H di ¯ + 2 σ di . According to existing method, if the target IP in unit time is not concentrated at a specific value, it is judged as normal traffic.
To further reduce the false positive rate, we use a signature-type method to redefine similar anomalous traffic patterns that are outside the normal traffic range defined above.
First, we define the flash crowd [28], which are traffic patterns that are similar to attacks but are not attacks. A flash crowd is similar to a DDoS attack in that the traffic is concentrated on the server side; however, it is due to frequent accesses from users. Thus, this traffic can be judged as normal traffic. This means that there is little chance that the exact same packet exists in the flash crowd traffic, but the degree of variation in packet size is high. On the other hand, as the access frequency increases, the variability of the source port also increases. In summary, traffic that meets the three conditions of H di ¯ 2 σ di > H i di , H sp ¯ + 2 σ sp < H i sp , H ps ¯ + 2 σ ps < H i ps will be determined as a flash crowd.
Flooding attacks, on the other hand, send the same packets with the goal of increasing the instantaneous traffic volume [29]. Therefore, the degree of dispersion of source ports and packet sizes is low. Unlike a flash crowd, traffic that meets the three conditions of H di ¯ 2 σ di > H i di , H sp ¯ 2 σ sp > H i sp , H ps ¯ 2 σ ps > H i ps will be determined as a flooding attack.
The packet-in attack is an attack only in the SDN architecture that exploits the working principle of the OpenFlow protocol to send fake packets by sending a large number of request messages from the switch to the controller [30]. Since the size of the packet-in message is fixed, the degree of dispersion in packet size is low. On the other hand, since messages are sent from specific ports of each switch to the controller, the packet-in attack scale increases, and the degree of dispersion of the source port is higher than normal when the number of affected switches is large. In summary, traffic that meets the three conditions of H di ¯ 2 σ di > H i di . H sp ¯ + 2 σ sp < H i sp , H ps ¯ 2 σ ps > H i ps will be determined as a packet-in attack.
Finally, to take advantage of the anomaly-type method and to detect unknown attacks that have not been defined, we consider traffic patterns outside the normal traffic range that are not clearly defined as attacks [31]. The presence or absence of an attack (0 or 1) is determined according to the values shown in Table 1. Note that the entropy values of 1, 0, or 2 in the table refer to “ H ¯ + 2 σ < H i ”, “ H ¯ 2 σ > H i ”, and ” H ¯ 2 σ H i H ¯ + 2 σ ”, respectively, and the decision types S and A for each pattern refer to signature and anomaly types.

4. Numerical Analysis

4.1. Simulation Environment

In this simulation, as shown in Table 2, three typical types of anomalous traffic in the SDN architecture, ICMP flooding, flash crowds, and packet-in attacks, were simulated, and DDoS attack detection was performed using the proposed detection method on the parameters of packets collected during the simulation period. The SDN architecture used the Mininet software to construct the SDN net topology, and Open vSwitch (OVS) and Ryu controller were used for the SDN controller and OpenFlow switch. For this simulation environment, it was assumed that there were 12 hosts, 12 OVS switches, and 1 Ryu controller. A summary of the assumed environment is shown in the following Figure 7.

4.2. Analysis and Evaluation

In this paper, we used Scapy to generate normal traffic during T = 150 s and simulate abnormal traffic in the order of flash crowds, ICMP flooding, and packet-in attacks at regular intervals. In this simulation, we assumed the same conditions as in an existing study [9] and assumed that the amount of abnormal traffic was at least 5 times the amount of traffic arriving at all switches per unit time. To demonstrate the validity of the experiment, we also collected three datasets of attack intensity, 100 % , 75 % , and 50 % , in order to perform entropy calculations by holding normal traffic to a constant standard and varying the frequency of attack traffic transmissions.
In this simulation, as shown in Figure 8:
-
1–25 s is normal traffic only
-
26–54 s is both normal traffic and flash crowd traffic
-
55–65 s is normal traffic only
-
66–82 s is both normal traffic and ICMP flooding traffic
-
83–112 s is normal traffic only
-
113–144 s is both normal traffic and packet-in attack traffic
-
145–150 s is normal traffic only
In addition, As shown in Figure 9 specific normal traffic patterns and attack patterns were set as follows.
For numerical computation, we used Wireshark to analyse packets successfully sent from hosts in the SDN constructed during T = 150 s. We also computed entropy by selecting 100 pieces of data in each time interval, assuming a window size of m = 100 .
The destination IP is a significant feature that can be leveraged for detecting DDoS attacks. As shown in Figure 10, during the period when the three types of abnormal traffic occurred, there was a substantial increase in the number of data packets sent to a specific destination IP address, resulting in a lower entropy for the destination IP than that of the normal state. Additionally, the number of transmissions to the same destination IP tended to increase. Therefore, the concentration of entropy for a single destination address is one of the conditions for determining the occurrence of any of the three types of abnormal traffic.
Figure 11 show the conditional entropy of the source port value change. Flash crowd occurrences are typically caused by network congestion resulting from frequent user requests for services. This, in turn, leads to a high frequency of source port changes, resulting in an increased entropy of source ports based on the destination IP address compared to normal periods. During flooding attacks, attackers continuously send a large volume of packets to a specific destination address, leading to a drastic decrease in the entropy of source ports based on the destination IP address during the attack. In the case of packet-in attacks, attackers attempt to involve as many switches as possible in sending packet-in messages, leading to a slight increase in the entropy of source ports based on the destination IP address compared to normal periods.
Figure 12 show the conditional entropy of the packet size value change. In the case of flash crowds, actual user operations during this period make it nearly impossible for packet lengths to be completely consistent, resulting in an increased entropy of packet length based on the destination address. For flooding and packet-in attacks, the former requires a sufficiently high instantaneous flow rate, where attackers send a large number of data packets with the same length to conduct a flow attack. The latter is a result of the high volume of data packets generated in packet-in attacks based on the fixed length of the special message in the OpenFlow protocol. As a result, the entropy of packet length based on destination address will decrease during the occurrence of these two attacks.
In this paper, precision, recall, F1 score, and accuracy were used as evaluation values [32]. By combining two of each detected and actual results, there were four patterns with correct and incorrect answers, called T P (true positive), F P (false positive), T N (true negative), and F N (false negative). The precision, recall, F1 score, and accuracy were calculated using the above T P , F P , T N , and F N as follows. We used the confusion matrix to calculate the above performance indicators. The confusion matrix is shown in Figure 13.
P r e c i s i o n = T P T P + F P
R e c a l l = T P T P + F N
F 1 S c o r e = 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l
A c c u r a c y = T P + T N T P + F N + T N + F P
We performed a comparative analysis of various entropy-based algorithms to demonstrate the efficacy of our proposed algorithm in achieving a balance between calculation accuracy and speed. Specifically, our proposed approach, along with [33,34], is based on conditional entropy, while [35] is based on joint entropy and [9,36] are based on single entropy. The comparison of the results is presented in Table 3.
In contrast, As shown in Figure 14, the proposed conditional entropy-based method achieves the highest accuracy and recall scores while maintaining a high precision score. This is because the proposed method takes into account multiple parameters, including source and destination addresses, source and destination ports, and packet lengths, to evaluate the overall uncertainty of multiple parameters as a whole, which improves the detection accuracy and reduces false negatives. Therefore, the proposed method is a more effective and accurate method for DDoS attack detection compared to other entropy-based methods. Additionally, the proposed method in this paper also takes advantage of the feature of conditional entropy, which can measure the uncertainty of multiple parameters as a whole, instead of relying solely on single entropy or joint entropy. This approach provides a more comprehensive and accurate evaluation of abnormal traffic, especially for flash crowds, which can be challenging to detect using single entropy- or joint entropy-based methods. Overall, the proposed method achieves a balance between accuracy and efficiency, making it a promising approach for real-time DDoS detection.

5. Conclusions

This paper proposes an attack detection method that uses conditional entropy to reduce the incidence of false positives by considering the similarity of abnormal traffic. Previous studies have used anomaly-type methods, which have two problems: insufficient attack patterns and unclearly defined degree of dispersion, leading to a high false positive rate in complex network environments. Therefore, this research defines attack patterns and normal traffic clearly by employing both signature- and anomaly-type methods. In addition, it individually defines parts that are similar to attacks and aggregates the range of normal traffic. Our proposed method for identifying anomalous traffic quantifies the concentration of traffic based on the mean and standard deviation, and uses changes in three types of entropy values to determine the type of traffic, thereby achieving more precise attack detection. Additionally, pre-processing is performed during traffic collection, so it is not necessary to traverse all collected packets, but only to process a random sample of packets to quickly obtain entropy values while maintaining a certain level of accuracy. Compared with existing methods, this approach has lower false positive rates, higher detection accuracy, and faster response times.
As a future challenge, the data collection part should be placed in the controller, and a system that notifies the switch as soon as traffic changes are detected in real time will enable higher-performance attack detection.

Author Contributions

Conceptualization, Q.T.; methodology, Q.T.; validation, Q.T. and S.M.; investigation, Q.T. and S.M.; resources, Q.T. and S.M.; writing—original draft preparation, Q.T.; writing—review and editing, Q.T. and S.M.; visualization, S.M.; project administration, S.M.; supervision, S.M.; funding, S.M. All authors have read and agreed to the published version of the manuscript.

Funding

These research results were obtained from the commissioned research (No. 05201) by the National Institute of Information and Communications Technology (NICT), Japan. This work was supported by JSPS KAKENHI Grant Numbers 19K11947, 22K12015, 22K12036.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets generated during the current study are available in the MDPI_den_2023, at https://github.com/sit-icnl/MDPI_den_2023 (accessed on 16 February 2023).

Acknowledgments

We would like to thank the anonymous reviewers for their comments and suggestions that help us improve the paper. Also We thank Zihan Zhang from University of Technology Sydney for his professional help in scripting.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chaganti, R.; Suliman, W.; Ravi, V.; Dua, A. Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks. Information 2023, 14, 41. [Google Scholar] [CrossRef]
  2. Otoum, Y.; Chamola, V.; Nayak, A. Federated and Transfer Learning-Empowered Intrusion Detection for IoT Applications. IEEE Internet Things Mag. 2022, 5, 50–54. [Google Scholar] [CrossRef]
  3. Nadeau, T.D.; Gray, K. SDN: Software Defined Networks: An Authoritative Review of Network Programmability Technologies; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2013. [Google Scholar]
  4. Flauzac, O.; González, C.; Hachani, A.; Nolot, F. SDN based architecture for IoT and improvement of the security. In Proceedings of the 2015 IEEE 29th International Vonference on Advanced Information Networking and Applications Workshops, Gwangju, Republic of Korea, 24–27 March 2015; pp. 688–693. [Google Scholar]
  5. Deepa, V.; Sudar, K.M.; Deepalakshmi, P. Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In Proceedings of the 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 13–14 December 2018; pp. 299–303. [Google Scholar]
  6. Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company. 1980. Available online: https://cir.nii.ac.jp/crid/1573950399661362176 (accessed on 9 April 2023).
  7. Li, L.; Zhou, J.; Xiao, N. DDoS attack detection algorithms based on entropy computing. In Proceedings of the Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, 12–15 December 2007; pp. 452–466. [Google Scholar]
  8. Lee, W.; Stolfo, S.J.; Mok, K.W. Mining in a data-flow environment: Experience in network intrusion detection. In Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Rio de Janeiro, Brazil, 20–24 May 2019; pp. 114–124. [Google Scholar]
  9. Carvalho, R.N.; Bordim, J.L.; Alchieri, E.A.P. Entropy-based DoS attack identification in SDN. In Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Rio de Janeiro, Brazil, 20–24 May 2019; pp. 627–634. [Google Scholar]
  10. Mao, J.; Deng, W.; Shen, F. DDoS flooding attack detection based on joint-entropy with multiple traffic features. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security Furthermore, Privacy in Computing Furthermore, Communications, New York, NY, USA, 1–3 August 2018; pp. 237–243. [Google Scholar]
  11. David, J.; Thomas, C. Discriminating flash crowds from DDoS attacks using efficient thresholding algorithm. J. Parallel Distrib. Comput. 2021, 152, 79–87. [Google Scholar] [CrossRef]
  12. Ioulianou, P.; Vasilakis, V.; Moscholios, I.; Logothetis, M. A signature-based intrusion detection system for the internet of things. Inf. Commun. Technol. Form 2018, in press. [Google Scholar]
  13. Aldwairi, M.; Abu-Dalo, A.M.; Jarrah, M. Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework. EURASIP J. Inf. Secur. 2017, 2017, 9. [Google Scholar] [CrossRef]
  14. Kyaw, A.T.; Oo, M.Z.; Khin, C.S. Machine-Learning Based DDOS Attack Classifier in Software Defined Network. In Proceedings of the 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Phucket, Thailand, 24–27 June 2020; pp. 431–434. [Google Scholar]
  15. Huibin, J.; Liu, G.; Luo, D.; Jiang, H.; Wang, X.; Li, Y. A CGAN-based DDoS Attack Detection Method in SDN. In Proceedings of the IWCMC 2021, Harbin, China, 28 June–2 July 2021; pp. 1030–1034. [Google Scholar] [CrossRef]
  16. Kumar, V.; Sangwan, O.P. Signature based intrusion detection system using SNORT. Int. J. Comput. Appl. Inf. Technol. 2012, 1, 35–41. [Google Scholar]
  17. Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection: A survey. ACM Comput. Surv. CSUR 2009, 41, 1–58. [Google Scholar] [CrossRef]
  18. Dixit, A.; Hao, F.; Mukherjee, S.; Lakshman, T.; Kompella, R. Towards an elastic distributed SDN controller. ACM SIGCOMM Comput. Commun. Rev. 2013, 43, 7–12. [Google Scholar] [CrossRef]
  19. Karakus, M.; Durresi, A. A survey: Control plane scalability issues and approaches in software-defined networking (SDN). Comput. Netw. 2017, 112, 279–293. [Google Scholar] [CrossRef]
  20. Zhang, M.; Li, G.; Xu, L.; Bi, J.; Gu, G.; Bai, J. Control plane reflection attacks in SDNs: New attacks and countermeasures. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, Heraklion, Greece, 10–12 September 2018; pp. 161–183. [Google Scholar]
  21. Feinstein, L.; Schnackenberg, D.; Balupari, R.; Kindred, D. Statistical approaches to DDoS attack detection and response. In Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 22–24 April 2003; Volume 1, pp. 303–314. [Google Scholar]
  22. Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials 2013, 15, 2046–2069. [Google Scholar] [CrossRef]
  23. Bhardwaj, S.; Panda, S.N.; Datta, P. Layer-Based Attacks in the Ternary Planes of Software-Defined Networking. In Proceedings of the 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), Bhubaneswar, India, 15–16 November 2020; pp. 292–295. [Google Scholar] [CrossRef]
  24. Yu, S.; Thapngam, T.; Liu, J.; Wei, S.; Zhou, W. Discriminating DDoS flows from flash crowds using information distance. In Proceedings of the 2009 3d International Conference on Network and System Security, Gold Coast, Australia, October 2009; pp. 351–356. [Google Scholar]
  25. Thapngam, T.; Yu, S.; Zhou, W.; Beliakov, G. Discriminating DDoS attack traffic from flash crowd through packet arrival patterns. In Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 10–15 April 2011; pp. 952–957. [Google Scholar]
  26. Müter, M.; Asaj, N. Entropy-based anomaly detection for in-vehicle networks. In Proceedings of the 2011 IEEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany, 5–9 June 2011; pp. 1110–1115. [Google Scholar]
  27. You, X.; Feng, Y.; Sakurai, K. Packet in message based DDoS attack detection in SDN network using OpenFlow. In Proceedings of the 2017 Fifth International Symposium on Computing and Networking (CANDAR), Dresden, Germany, 14–18 June 2017; pp. 522–528. [Google Scholar]
  28. Oikonomou, G.; Mirkovic, J. Modeling human behavior for defense against flash-crowd attacks. In Proceedings of the 2009 IEEE International Conference on Communications, Singapore, 25–28 October 2009; pp. 1–6. [Google Scholar]
  29. Wang, H.; Zhang, D.; Shin, K.G. Detecting SYN flooding attacks. In Proceedings of the 25st Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 23–27 June 2002; Volume 3, pp. 1530–1539. [Google Scholar]
  30. Gao, D.; Liu, Z.; Liu, Y.; Foh, C.H.; Zhi, T.; Chao, H.C. Defending against Packet-In messages flooding attack under SDN context. Soft Comput. 2018, 22, 6797–6809. [Google Scholar] [CrossRef]
  31. Ahmed, M.; Mahmood, A.N.; Hu, J. A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 2016, 60, 19–31. [Google Scholar] [CrossRef]
  32. Chicco, D.; Jurman, G. The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genom. 2020, 21, 6. [Google Scholar] [CrossRef] [PubMed]
  33. Miyata, T.Q. Conditional entropy based DDoS Attack detection in Software Defined Network. IEICE Tech. Rep. 2022, 122, 1–6. [Google Scholar]
  34. Xuanyuan, M.; Ramsurrun, V.; Seeam, A. Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking. In Proceedings of the 2019 11th International Conference on Advanced Computing (ICoAC), Chennai, India, 18–20 December 2019; pp. 66–71. [Google Scholar]
  35. Aladaileh, M.A.; Anbar, M.; Hintaw, A.J.; Hasbullah, I.H.; Bahashwan, A.A.; Al-Sarawi, S. Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates. Appl. Sci. 2022, 12, 6127. [Google Scholar] [CrossRef]
  36. Swami, R.; Dave, M.; Ranga, V. Defending DDoS against software defined networks using entropy. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019; pp. 1–5. [Google Scholar]
Figure 1. Intrusion detection system.
Figure 1. Intrusion detection system.
Iot 04 00006 g001
Figure 2. Anomaly-type and signature-type IDS.
Figure 2. Anomaly-type and signature-type IDS.
Iot 04 00006 g002
Figure 3. False detection in an IDS of anomaly type.
Figure 3. False detection in an IDS of anomaly type.
Iot 04 00006 g003
Figure 4. Randomness of a single parameter.
Figure 4. Randomness of a single parameter.
Iot 04 00006 g004
Figure 5. Randomness of complex parameters.
Figure 5. Randomness of complex parameters.
Iot 04 00006 g005
Figure 6. Proposed detection method.
Figure 6. Proposed detection method.
Iot 04 00006 g006
Figure 7. Network topology.
Figure 7. Network topology.
Iot 04 00006 g007
Figure 8. Amount of traffic.
Figure 8. Amount of traffic.
Iot 04 00006 g008
Figure 9. Attack patterns.
Figure 9. Attack patterns.
Iot 04 00006 g009
Figure 10. Destination IP entropy.
Figure 10. Destination IP entropy.
Iot 04 00006 g010
Figure 11. Source port conditional entropy.
Figure 11. Source port conditional entropy.
Iot 04 00006 g011
Figure 12. Packet size conditional entropy.
Figure 12. Packet size conditional entropy.
Iot 04 00006 g012
Figure 13. Illustration of the confusion matrix.
Figure 13. Illustration of the confusion matrix.
Iot 04 00006 g013
Figure 14. Comparison of the confusion matrix between six entropy methods. (a) Proposed method; (b) Conditional entropy [33]; (c) Conditional entropy [34]; (d) Joint Renyi entropy [35]; (e) Single entropy [9]; (f) Single entropy [36].
Figure 14. Comparison of the confusion matrix between six entropy methods. (a) Proposed method; (b) Conditional entropy [33]; (c) Conditional entropy [34]; (d) Joint Renyi entropy [35]; (e) Single entropy [9]; (f) Single entropy [36].
Iot 04 00006 g014
Table 1. Abnormal traffic patterns.
Table 1. Abnormal traffic patterns.
Flash
Crowds
Flooding
Attack
Packet-in
Attack
Normal
Traffic
Others
H di 0001 o r 2-
H sp 101--
H ps 100--
Attack10010
TypeSSSAA
Table 2. Parameter settings.
Table 2. Parameter settings.
Normal
Traffic
Flash
Crowds
ICMP
Flooding
Packet-in
Attack
Host number1–121–115–6
Destination host number1–121212
Protocol85%TCP
10%UDP
5%ICMP
TCPICMPUDP
Sizerandomrandom42random
Table 3. Performance of different methods.
Table 3. Performance of different methods.
Accuracy (%)Precision (%)Recall (%)F1 Score (%)Detecting Time (s)
Proposed method97.210094.297.00.74
[33]93.695.990.493.10.75
[34]97.710096.198.014
[35]77.910065.379.034
[9]67.995.959.573.40.06
[36]73.291.864.375.80.15
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tian, Q.; Miyata, S. A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic. IoT 2023, 4, 95-111. https://doi.org/10.3390/iot4020006

AMA Style

Tian Q, Miyata S. A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic. IoT. 2023; 4(2):95-111. https://doi.org/10.3390/iot4020006

Chicago/Turabian Style

Tian, Qiwen, and Sumiko Miyata. 2023. "A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic" IoT 4, no. 2: 95-111. https://doi.org/10.3390/iot4020006

Article Metrics

Back to TopTop