Learning Entropy - NETWORKING 2011 - Part I Access content directly
Conference Papers Year : 2011

Learning Entropy

Lele Zhang
  • Function : Author
  • PersonId : 1015751
Darryl Veitch
  • Function : Author
  • PersonId : 855414

Abstract

Entropy has been widely used for anomaly detection in various disciplines. One such is in network attack detection, where its role is to detect significant changes in underlying distribution shape due to anomalous behaviour such as attacks. In this paper, we point out that entropy has significant blind spots, which can be made use by adversaries to evade detection. To illustrate the potential pitfalls, we give an in-principle analysis of network attack detection, in which we design a camouflage technique and show analytically that it can perfectly mask attacks from entropy based detector with low costs in terms of the volume of traffic brought in for camouflage. Finally, we illustrate and apply our technique to both synthetic distributions and ones taken from real traffic traces, and show how attacks undermine the detector.
Fichier principal
Vignette du fichier
978-3-642-20757-0_2_Chapter.pdf (340.11 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01583407 , version 1 (07-09-2017)

Licence

Attribution

Identifiers

Cite

Lele Zhang, Darryl Veitch. Learning Entropy. 10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.15-27, ⟨10.1007/978-3-642-20757-0_2⟩. ⟨hal-01583407⟩
42 View
60 Download

Altmetric

Share

Gmail Facebook X LinkedIn More