Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2009.1180.1188YanRuoyu ZhengQinghua 8200988In this study, we propose Renyi cross entropy to analyze matrix traffic and detect anomaly rather than other entropy metrics, such as Shannon entropy, used extensively in many earlier studies. At first, we introduce a new type of traffic termed IF-flow (internal flow) collected in router. IF-flow can make the attack traffic more conspicuous in a large number of normal traffics, which makes attacks, especially DDoS attacks, spotted more easily. Then, the analysis of Renyi cross entropy of IF-flow matrix traffic, Abilene matrix traffic confirms that matrix traffic distribution has local stability in time. This conclusion provides a guidance to accurately detect anomaly. Finally, Renyi cross entropy is used to detect DDoS attacks existed in IF-flow testing data set and Abilene testing data set. The results of detection experiments show Renyi cross entropy based method can detect DDoS attacks at the beginning with higher detection rate, lower false alarm than Shannon entropy based method.]]>Kulkarni, A. and S. Bush,2006Lakhina, A., M. Crovella and C. Diot,2005Lakhina, A., M. Crovella and C. Diot,2004Wagner, A. and B. Plattner,2005Soule, A., K. Salamatian and N. Taft,2005Eiland, E.E. and L.M. Liebrock,2006Aczel, J. and Z. Darciczy,1975Yuan, J., Z. Li and R. Yuan,2008Kumar, K., R.C. Joshil and K. Singh,2007Moore, D., G.M. Voelker and S. Savage,2001Yan, R., Q. Zheng and W. Peng,2008Yan, R., Q. Zheng, G. Niu and S. Gao,2008Peng, T., C. Leckie and K. Ramamohanarao,2003Qin. T., X. Guan, W. Li and P. Wang,2008