Entropy-Based Characterization of Internet Background Radiation
VerfasserIglesias, Félix ; Zseby, Tanja
Erschienen in
Entropy, 2015, Jg. 17, S. 74-101
Published version
DokumenttypAufsatz in einer Zeitschrift
Schlagwörter (EN)network security / information entropy / time series analysis / supervised classification / signal modeling
URNurn:nbn:at:at-ubtuw:3-48 Persistent Identifier (URN)
 Das Werk ist frei verfügbar
Entropy-Based Characterization of Internet Background Radiation [2.95 mb]
Zusammenfassung (Englisch)

Network security requires real-time monitoring of network traffic in order to detect new and unexpected attacks. Attack detection methods based on deep packet inspection are time consuming and costly, due to their high computational demands. This paper proposes a fast, lightweight method to distinguish different attack types observed in an IP darkspace monitor. The method is based on entropy measures of traffic-flow features and machine learning techniques. The explored data belongs to a portion of the Internet background radiation from a large IP darkspace, i.e., real traffic captures that exclusively contain unsolicited traffic, ongoing attacks, attack preparation activities and attack aftermaths. Results from an in-depth traffic analysis based on packet headers and content are used as a reference to label data and to evaluate the quality of the entropy-based classification. Full IP darkspace traffic captures from a three-week observation period in April, 2012, are used to compare the entropy-based classification with the in-depth traffic analysis. Results show that several traffic types present a high correlation to the respective traffic-flow entropy signals and can even fit polynomial regression models. Therefore, sudden changes in traffic types caused by new attacks or attack preparation activities can be identified based on entropy variations.