Entropy-based Detection Method against DoS/DDoS attacks in an SDN-IoT environment
TL;DR
This project studies the approach of detecting DoS/DDoS attacks using an entroy-based detection method. Experiments were conducted in an SDN environment, virtually using Mininet. Below is a snipet of the work. Please read the full paper here.
Keywords
IoT, SDN (Software-Defined Network), DoS, DDoS, Entropy-based detection
Goals
The key contributions in this paper are listed in the following:
-
A real-time approach to detect DoS/DDoS attacks by calculating the entropy of the network traffic in the SDN architecture. A practical way to use entropy-based detection with the consideration of fast-response while the network traffic is being loaded.
-
The calculation of entropy is done with the help of sFlow-RT. (sFlow Monitoring Technology). Number of packets being analyzed do not effect the computational power of the main controller of SDN.
Key technology/points
SDN (Software-Defined Network)
A network architecture that is realized by virtualizing its components. SDN is structured in a way that its network is centralized, and can be centrally controlled with software applications.
Entropy-based detection
In information theory, entropy can be used to measure the uncertainty of information. In the context of detecting a heavy incoming traffic, entropy would measure the randomness in the incoming packets in the network. This calculation can be done with Shannon entropy. Shannon entropy can be defined as :
Where there is an information source, n
is the independent symbols, p_i
is the probability of each n
, and H
would be entropy value.
During a DoS/DDoS attack, the changes in network traffic distribution fluctuates drastically. When this happens, the entropy calculation could measure that and trigger alert about the state of the traffic.
To judge whether the calculated entropy is anomalous or not, it is necessary to set a ‘threshold’. If the calculate entropy drops below the threshold, then the traffic can be considered as an attack.
Threshold Setting Method
The threshold setting method used here is derived from [7]. This mitigation method was chosen because of its adaptive threshold algorithm. Where the threshold of the detection is updated according to the state of the traffic. It is suitable for detecting small and stealthy attack.
The flow of the threshold setting method can be summarized as below:
Where H
is the current entropy value, µ
and σ
are the mean and standard deviation of flow count during a particular time interval , D
is the difference between the mean value µ and the entropy, and β
the threshold multiplication factor.
Experimental Scenarios
DoS Scenario
To test the detection in a DoS scenario, a network like in figure below was set up. The red node (h1) represents the attacker and the green node (h4) represents the target. The bandwitdh of each connection is set to be 1Mbits/sec. So any flow that goes beyond 1Mbits/sec would make the connected device inaccessible. The traffic is being monitored from the Control Plane. The attacking machines are sending packets as fast as possible to the target machine until it goes beyond the bandwidth.
DDoS Scenario
In the DDoS scenario, the network architecture that was set up is similar to the one in DoS scenario. Instead this time 9 hosts and 4 switches were used connected in a tree topology. Multiple attacking hosts (h1-h4) are set to attack a single target (h9). The attacking 5 machines are also sending packets as fast as possible to the target machine.
Experimental Method
Method flowchart
Result (Detection Speed)
DoS Scenario
DDoS Scenario