CFP last date
20 December 2024
Reseach Article

Hybrid Technique of Pre Shared Key and Entropy Variation for DDOS Detection

by Ruby Jain, Anuraag Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 6
Year of Publication: 2014
Authors: Ruby Jain, Anuraag Jain
10.5120/18380-9616

Ruby Jain, Anuraag Jain . Hybrid Technique of Pre Shared Key and Entropy Variation for DDOS Detection. International Journal of Computer Applications. 105, 6 ( November 2014), 9-13. DOI=10.5120/18380-9616

@article{ 10.5120/18380-9616,
author = { Ruby Jain, Anuraag Jain },
title = { Hybrid Technique of Pre Shared Key and Entropy Variation for DDOS Detection },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 6 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number6/18380-9616/ },
doi = { 10.5120/18380-9616 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:59.508716+05:30
%A Ruby Jain
%A Anuraag Jain
%T Hybrid Technique of Pre Shared Key and Entropy Variation for DDOS Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 6
%P 9-13
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Here in this paper an effective technique for the detection of intrusion is proposed. The model is based on the hybrid combinatorial method of Pre shared key exchange and entropy variation. The data to be sent is first authenticated by the local router by comparing the shared key between them. The sender once authenticated can successfully sends the data to the receiver, but the variation of entropy is calculated based on the distance between sender and local router and if the entropy variates alarm is generated. The methodology implemented here provides high detection ratio and less false alarm rate as well as chances of attacks is reduced. The result shows the performance of the methodology, on the basis of storage, Trace back time and operation overload nearly 3-5 % enhancement in the detection of DDOS.

References
  1. Yu, Shui, Wanlei Zhou, Robin Doss, and Weijia Jia. "Trace back of DDOS attacks using entropy variations. " IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, pp. 412-425, 2011.
  2. Baig, Zubair A. , Sadiq M. Sait, and AbdulRahman Shaheen. "GMDH-based networks for intelligent intrusion detection", ELSEVIER Engineering Applications of Artificial Intelligence, vol. 26, issue 7, pp. 1731–1740, 2013.
  3. Yuebin Bai and Hidetsune Kobayashi "Intrusion Detection System: Technology & Development", Proceedings of the IEEE 17th International Conference on Advanced formation Networking and Applications (AINA'03), pp. 710 – 715, 2003.
  4. Sonawane, Sandip, Pardeshi, Shailendra and Prasad, Ganesh "A survey on intrusion detection techniques World Journal of Science and Technology, vol. 2, issue 3, pp. 127-133, 2012.
  5. Singh, Jaswinder, Sachdeva, Monika And Kumar, Krishan "Detection of DDOS Attacks Using Source IP Based Entropy", International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), ISSN 2249-6831, Vol. 3, Issue 1, pp. 201-210, Mar 2013.
  6. Liu, Ting, Zhiwen Wang, Haijun Wang, and Ke Lu. "An Entropy-based Method for Attack Detection in Large Scale Network. " International Journal of Computer Communication, vol. 7, no. 3, pp. 509-517, 2012.
  7. Caglioti, Vincenzo. "An entropic criterion for minimum uncertainty sensing in recognition and localization. I. Theoretical and conceptual aspects. " IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 31, no. 2, pp. 187-196, 2001.
  8. Lehrer, Ehud, and Rann Smorodinsky. "Relative entropy in sequential decision problems. " Journal of Mathematical Economics, vol. 33, no. 4, pp. 425-439, 2000.
  9. Hoeper, Katrin, and Guang Gong. "Identity-based key exchange protocols for ad hoc networks. " In Proceedings of the Canadian Workshop on Information Theory (CWIT'05), pp. 127-130. 2005.
  10. Kuo, Fang-Chun, Hannes Tschofenig, Fabian Meyer, and Xiaoming Fu. "Comparison Studies between Pre-Shared Key and Public Key Exchange Mechanisms for Transport Layer Security (TLS). " Institute for Informatics, University of Goettingen, Technical Report IFI-TB-2006-01, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Trace back Intrusion Detection System Entropy Variation DDOS.