Please use this identifier to cite or link to this item: https://research.matf.bg.ac.rs/handle/123456789/1645
DC FieldValueLanguage
dc.contributor.authorIbrahim, Jen_US
dc.contributor.authorGajin, Slavkoen_US
dc.date.accessioned2025-03-13T16:52:18Z-
dc.date.available2025-03-13T16:52:18Z-
dc.date.issued2022-
dc.identifier.urihttps://research.matf.bg.ac.rs/handle/123456789/1645-
dc.description.abstractEntropy-based network traffic anomaly detection techniques are attractive due to their simplicity and applicability in a real-time network environment. Even though flow data provide only a basic set of information about network communications, they are suitable for efficient entropy-based anomaly detection techniques. However, a recent work reported a serious weakness of the general entropy-based anomaly detection related to its susceptibility to deception by adding spoofed data that camouflage the anomaly. Moreover, techniques for further classification of the anomalies mostly rely on machine learning, which involves additional complexity. We address these issues by providing two novel approaches. Firstly, we propose an efficient protection mechanism against entropy deception, which is based on the analysis of changes in different entropy types, namely Shannon, Rényi, and Tsallis entropies, and monitoring the number of distinct elements in a feature distribution as a new detection metric. The proposed approach makes the entropy techniques more reliable. Secondly, we have extended the existing entropy-based anomaly detection approach with the anomaly classification method. Based on a multivariate analysis of the entropy changes of multiple features as well as aggregation by complex feature combinations, entropy-based anomaly classification rules were proposed and successfully verified through experiments. Experimental results are provided to validate the feasibility of the proposed approach for practical implementation of efficient anomaly detection and classification method in the general real-life network environment.en_US
dc.language.isoenen_US
dc.publisherComSIS Konzorcijumen_US
dc.relation.ispartofComputer Science and Information Systems - ComSISen_US
dc.subjectanomaly classificationen_US
dc.subjectanomaly detectionen_US
dc.subjectentropyen_US
dc.subjectentropy deceptionen_US
dc.subjectnetwork behaviour analysisen_US
dc.titleEntropy-based network traffic anomaly classification method resilient to deceptionen_US
dc.typeArticleen_US
dc.identifier.doi10.2298/CSIS201229045I-
dc.identifier.scopus2-s2.0-85122231140-
dc.identifier.isi000755041300003-
dc.identifier.urlhttp://dx.doi.org/10.2298/CSIS201229045I-
dc.relation.issn1820-0214en_US
dc.description.rankM23en_US
dc.relation.firstpage87en_US
dc.relation.lastpage116en_US
dc.relation.volume19en_US
dc.relation.issue1en_US
item.grantfulltextnone-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeArticle-
item.fulltextNo Fulltext-
item.languageiso639-1en-
crisitem.author.orcid0000-0002-8939-3589-
Appears in Collections:Research outputs
Show simple item record

SCOPUSTM   
Citations

11
checked on Apr 16, 2025

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.