Project
Project
RHG TECHNOLOGY
THANIKONDA LEKHYA
S.No CONTENT
1. ABSTRACT
2 INTRODUCTION
3. EXISTING METHOD
5 METHODOLOGY
6. IMPLEMENTATION
7. CONCLUSION
3.ABSTRACT
Distributed Denial of Service (DDoS) attacks have emerged a
popular means of causing mass targeted service disruptions,
sometime for extended periods of time. The relative ease and low
cost of launching such attacks, supplemented by the current
inadequate defense mechanism, have made them one of the top
threats to the Internet community today. Since the increasing
popularity of web-based applications has led to several critical
services being provided over the Internet, it is necessary to monitor
the network traffic so as to prevent malicious attackers from
depleting the resources of the network and denying services to
legitimate users. Due to increase in sophistication of attacks and
large complex networks have made the defense mechanism
challenging. Although a number of techniques have been proposed
• This method is based on the entropy variation of the
YT
destination host targeted with its IP address and can detect the
attack within the first 250 packets of malicious traffic
attacking a particular host. Then, fingrained packet-based
detection is performed using a deep-learning model to classify
the attack into different types of attack categories. Lastly, the
controller sends the updated traffic information neighbor
controllers. The chi-squared (x2) test feature selection
algorithm was also employed to reveal the most relevant
features that scored the highest in the provided data set. The
experiment result demonstrated that the proposed Long Short-
Term Memory (LSTM) modelachieved an accuracy of up to
99.42% using the data set CICDDoS2019, which has the
potential to detect and classify the DDoS attack traffic
effectively in multicontroller SDN environment. In this regard,
it has an enhanced accuracy level to 0.42%
tr
YT
• Bandwidth-based attacks
• Attacks of this type send mass junk data messages to cause an
overload, leading to the
• depletion of network bandwidth or equipment resources.
Often the attacked routers,
• servers and firewalls processing resources are limited.
Overload attacks lead to their
• failure in handling normal legal access, resulting in either a
sharp decline in the quality of
• service or a complete denial of service - in either case it
means your customers, users, etc
• installed at the victim in order to consume excess amounts of
its resources. It includes
• Attacks of this type often send application-layer data.
Date of Review: Review No.
• In information theory, entropy is a measure of the uncertainty
st
𝒏
𝒊=𝟏
•
•
𝒑𝒊
• Where,
•
• is the emergence probability of each distinct source IP address.
• n is the total number of packets being analyzed, and
• H is the entropy.
• Misuse Detection: Identify well-defined patterns of known
exploits and then looks .
• out for the occurrences of such patterns. These patterns are
defined as attack
• signatures. Several popular network monitors perform signature-
based detection,
2.INTRODUCTION
• SDN is a new design that consists of three layers: data,
control, and application plane, with the data and control
planes being independent of one another .The data plane is
made up of switches and routers that forward network traffic;
the control plane is comprised of NOX, POX, Beacon,
Floodlight, and Open Daylight controllers; and the
application plane contains applications that configure SDN.
When the network is under a DDoS attack, the SDN
controller is unable to respond to the normal traffic that is
coming from the rest of the network, and the SDN loses
centralized control. As a result, the key benefit of SDN,
which is a centralized network control, is threatened by
DDoS attacks .In this regard, most of the recent works are
focused on detecting and classifying DDoS attacks with a
single controller using different mechanisms and are also
focused on either the accuracy or efficiency, not both. There
td
DDoS attacks using entropy and deep learning, there is still room for
improvement in terms of accuracy and robustness. Future studies could
explore different machine-learning algorithms, feature selection
techniques, and architectures to improve the performance of the model.
Evaluating the model’s performance in a real-world environment: the
current study evaluates the proposed model using simulated DDoS
attacks. However, it is important to evaluate the model’s performance in
a real-world environment where there are multiple types of traffic and
network conditions are constantly changing. Future studies could
explore how the model performs in actual network environments.
Addressing the issue of false positives: false positives can be a
significant issue in DDoS attack detection, as they can lead to
unnecessary network downtime or resource allocation. Future studies
could explore ways to reduce the number of false positives generated by
the model. Considering the impact of DDoS attacks on different types
of networks: the current study.
EXISTING METHOD
• Entropy-based detection methods for Distributed Denial of Service
(DDoS) attacks rely on the principle that DDoS attacks often
introduce significant changes in network traffic patterns. These
changes disrupt the natural randomness (entropy) of certain traffic
parameters. Below is an overview of the existing methods:
Key Concepts of Entropy-Based Detection:
• Measures the randomness or uncertainty in data distribution.
• 1.Entropy
• High entropy indicates diverse and random data, while low entropy
suggests concentration or regularity.
• 2. Entropy Analysis:
• Observes traffic attributes like source IPs, destination IPs, packet
sizes, and protocol usage.
No.
uf
3. Anomaly Detection:
Using the single controller topology leads to the single point of failure.
This proposed model addresses this issue by using multiple controller
detection
• Entropy-Based Method (Controller Detection Design)
Entropy-based methods depend on network feature
distributions to detect anomalous network activities [19].
Entropy is calculated using probability distributions for
several network features including source IP address,
destination IP address, and port numbers. Anomalies are
detected using predetermined criteria on changes in the
entropy values. The initial section of the overall method
includes PACKET_IN message rate detection, port
entropy detection, and the control module.
No.
METHODOLOGY
• The methodology for entropy-based detection of DDoS attacks involves systematic monitoring, analysis, and decision-making based on traffic randomness. Here's a step-by-step outline of the approach:
1. Data Collection
• Objective: Gather network traffic data to analyze patterns.
Sources:
NetFlow or packet capture tools (e.g., Wireshark, tcpdump).
Network monitoring systems (e.g., SNMP-based tools).
Parameters: Collect attributes like:
Source IP addresses
Destination IP addresses
Packet sizes
• Protocol types
• ---
• 2. Feature Extraction
• Examples:
• ---
• 3. Entropy Calculation
• Where:
• Steps:
• 1. Compute the probability distribution of the selected traffic attribute over a fixed time window.
• ---
• Baseline Entropy: Establish the normal entropy range during regular traffic conditions.
• Anomaly Detection:
• Low Entropy: Indicates concentrated traffic patterns (e.g., many packets from few IPs).
• High Entropy: Suggests randomized but abnormal traffic (e.g., distributed spoofed packets).
• ---
• 5. Thresholding
• Example:
2. Feature Extraction