Detection of network attacks using Entropy.

Keywords: network attacks, DDoS-attacks, entropy, data transmission channels, network, cyberattack.

Abstract

The problem of distributed denial of service (DDoS) is a common problem today. There are many ways to detect this type of attack. The entropy method is considered in the article

References

SAM COOK DDoS attack statistics and facts for 2018-2019 [Electronic resource] // - Access mode: https://www.comparitech.com/blog/information-security/dDoS-statistics-facts/

Current cyber threats - 2018. Trends and forecasts Date of publication March 12, 2019 [Electronic resource] // - Access mode: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2018/

Kupreev O. DDoS-attacks in the second quarter of 2019 [Electronic resource] O. Kupreev, E. Badovskaya, A. Gutnikov // - Access mode: https://securelist.ru/dDoS-report-q2-2019/ 94452 /

Kupreev O. DDoS-attacks in the third quarter of 2018 [Electronic resource] / O. Kupreev, E. Badovskaya, A. Gutnikov // - Access mode: https://securelist.ru/dDoS-report-in-q3 -2018 / 92512 /

DoS-attack on the server [Electronic resource] // - Access mode: https://i-exam.ru/node/542

Gresko A. General comprehensive description of information security problems in the "Internet of Things" / A. Gresko, Y. Shcheblanin // Modern information security. - 2016. - № 1. - p. 69-73.

Smoktiy O. Analysis of the mechanism and consequences of the impact of DDoS-attacks on the reference model of interaction of open OSI systems / O. Smoktiy, K. Smoktiy, O. Ivanchenko // Control, navigation and communication systems. - 2017. - № 1. - p.33-37.

Types of DDoS-attacks and algorithm for detecting DDoS-attacks of flood-attack type / [N. Bagniuk, V. Melnyk, O. Klekha, I. Nevidomsky] // Computer-integrated technologies: education, science, production. - 2015. - № 18. - P.6-12.

Protection against DDoS attacks with your own hands [Electronic resource] // - Access mode: https://geekelectronics.org/linux/zashhita-ot-dDoS-atak-svoimi-rukami.html

DOS and DDoS-attacks: the concept, types, methods of detection and protection [Electronic resource] - Mode of access to the resource: https://compconfig.ru/net/dos-i-ddos-ataki.html.

Babenko T. Investigation of entropy of network traffic as an indicator of DDOS-attacks / TV Babenko

Digital Attack MapTop [Electronic resource] - Mode of access to the resource

Reiher P. A taxonomy of DDoS attack and DDoS Defense mechanisms [Electronic resource] / P. Reiher, J. Mirkovic - Mode of access to the resource: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.879.9772&rep=rep1&type=pdf.


Abstract views: 0
PDF Downloads: 0
Published
2021-03-26
How to Cite
Soniak, S. (2021). Detection of network attacks using Entropy. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (42), 89-94. https://doi.org/10.36910/6775-2524-0560-2021-42-13