Skip to main content

A Real-Time Visualization Defense Framework for DDoS Attack

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 727))

  • 2608 Accesses

Abstract

In recent years, with the continuous development of DDoS attacks, DDoS attacks are becoming easier to implement. More and more servers and even personal computers are under the threat of DDoS attacks, especially DDoS flood attacks. Its main purpose is to cause the target host’s TCP/IP protocol layer to become congested. In this paper, we propose a real-time visualization defense framework for DDoS attack. Our framework is based on spark-streaming so that it allows for parallel and distributed traffic analysis that can be deployed at high speed network links. Moreover, this framework includes a cylindrical coordinates Visualization Model, which enables users to recognize DDoS threats promptly and clearly. The experiments show that our framework is able to detect and visualize DDoS flooding attacks timely and efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. YunDun 2015 H2 Report for State and Trends of the Internet DDoS Attacks (2015). Accessed 4 May 2017

    Google Scholar 

  2. Xmarkx. DDoS attacks in 2014: Smarter, bigger, faster, stronger (2014). https://greekorio.wordpress.com/2014/04/21/ddos-attacks-in-2014-smarter-bigger-faster-stronger/. Accessed 9 Nov 2015

  3. Bogdanoski, M., Shuminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. 5(8), 1–11 (2013)

    Google Scholar 

  4. Bhandari, N.H.: Survey on DDoS attacks and its detection & defence approaches. Int. J. Sci. Mod. Eng. (IJISME) 1(3), 2319–6386 (2013)

    Google Scholar 

  5. Tao, Y., Yu, S.: DDoS attack detection at local area networks using information theoretical metrics. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 233–240 (2013)

    Google Scholar 

  6. Challa, R.K., Rai, A.: Survey on recent DDoS mitigation techniques and comparative analysis. In: 2016 Second International Conference on Computational Intelligence & Communication Technology, pp. 96–101 (2016)

    Google Scholar 

  7. Bhuyan, M.H., Kashyap, H.J., Bhattacharyya, D.K., Kalita, J.K.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57(4), 537–556 (2014)

    Article  Google Scholar 

  8. Krunal, P.: Security survey for cloud computing: threats & existing IDS/IPS techniques. International Conference on Control, Communication and Computer Technology, pp. 88–92 (2013)

    Google Scholar 

  9. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. Commun. Surv. Tutorials IEEE 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  10. Gupta, S., Kumar, P., Abraham, A.: A profile based network intrusion detection and prevention system for securing cloud environment. Int. J. Distrib. Sens. Netw. 2013(1), 8–10 (2013)

    Google Scholar 

  11. Yi, F., Shui, Y., Zhou, W., Hai, J., Bonti, A.: Source-based filtering scheme against DDoS attacks. Int. J. Datab. Theory Appl. 1(1), 9–20 (2011)

    Google Scholar 

  12. Gavaskar, S., Surendiran, R., Ramaraj, E.: Three counter defense mechanism for TCP SYN flooding attacks. Int. J. Comput. Appl. 6(6), 12–15 (2010)

    Google Scholar 

  13. Choi, J., Chang, C., Yim, K., Kim, J., Kim, P.: Intelligent reconfigurable method of cloud computing resources for multimedia data delivery. Informatica 24(3), 381–394 (2013)

    Google Scholar 

  14. Zaharia, M., Das, T., Li, H., Hunter, T., Shenker, S., Stoica, I.: Discretized streams: fault-tolerant streaming computation at scale. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, pp. 423–438 (2013)

    Google Scholar 

  15. Lee, Y., Lee, Y.: Toward scalable internet traffic measurement and analysis with hadoop. ACM SIGCOMM Comput. Commun. Rev. 43(1), 5–13 (2013)

    Article  Google Scholar 

  16. Rettig, L., Khayati, M., Cudre-Mauroux, P., Piorkowski, M.: Online anomaly detection over big data streams. In: 2015 IEEE International Conference on Big Data (Big Data) (2015)

    Google Scholar 

  17. Zhang, J., Zhang, Y., Liu, P., He, J.: A spark-based DDoS attack detection model in cloud services. In: Bao, F., Chen, L., Deng, R.H., Wang, G. (eds.) ISPEC 2016. LNCS, vol. 10060, pp. 48–64. Springer, Cham (2016). doi:10.1007/978-3-319-49151-6_4

    Chapter  Google Scholar 

  18. Han, S.C., Seo, I., Lee, H.: Cylindrical coordinates security visualization for multiple domain command and control botnet detection. Comput. Secur. 46, 141–153 (2014)

    Article  Google Scholar 

  19. https://www.openhub.net/p/bonesi. Accessed 20 Feb 2017

  20. http://www.docin.com/p-1631407325.html. Accessed 8 May 2017

Download references

Acknowledgments

This work is partially supported by the Planned Science and Technology Project of Hunan Province, China (NO.2015JC3044), the National Natural Science Foundation of China (NO.61272147), and the National Science Fund for Young Scholars (NO.61309009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Jin, Y., Liang, Q., Zhang, J., Jin, O. (2017). A Real-Time Visualization Defense Framework for DDoS Attack. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6385-5_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6384-8

  • Online ISBN: 978-981-10-6385-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics