Abstract
In recent years, with the continuous development of DDoS attacks, DDoS attacks are becoming easier to implement. More and more servers and even personal computers are under the threat of DDoS attacks, especially DDoS flood attacks. Its main purpose is to cause the target host’s TCP/IP protocol layer to become congested. In this paper, we propose a real-time visualization defense framework for DDoS attack. Our framework is based on spark-streaming so that it allows for parallel and distributed traffic analysis that can be deployed at high speed network links. Moreover, this framework includes a cylindrical coordinates Visualization Model, which enables users to recognize DDoS threats promptly and clearly. The experiments show that our framework is able to detect and visualize DDoS flooding attacks timely and efficiently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
YunDun 2015 H2 Report for State and Trends of the Internet DDoS Attacks (2015). Accessed 4 May 2017
Xmarkx. DDoS attacks in 2014: Smarter, bigger, faster, stronger (2014). https://greekorio.wordpress.com/2014/04/21/ddos-attacks-in-2014-smarter-bigger-faster-stronger/. Accessed 9 Nov 2015
Bogdanoski, M., Shuminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. 5(8), 1–11 (2013)
Bhandari, N.H.: Survey on DDoS attacks and its detection & defence approaches. Int. J. Sci. Mod. Eng. (IJISME) 1(3), 2319–6386 (2013)
Tao, Y., Yu, S.: DDoS attack detection at local area networks using information theoretical metrics. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 233–240 (2013)
Challa, R.K., Rai, A.: Survey on recent DDoS mitigation techniques and comparative analysis. In: 2016 Second International Conference on Computational Intelligence & Communication Technology, pp. 96–101 (2016)
Bhuyan, M.H., Kashyap, H.J., Bhattacharyya, D.K., Kalita, J.K.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57(4), 537–556 (2014)
Krunal, P.: Security survey for cloud computing: threats & existing IDS/IPS techniques. International Conference on Control, Communication and Computer Technology, pp. 88–92 (2013)
Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. Commun. Surv. Tutorials IEEE 15(4), 2046–2069 (2013)
Gupta, S., Kumar, P., Abraham, A.: A profile based network intrusion detection and prevention system for securing cloud environment. Int. J. Distrib. Sens. Netw. 2013(1), 8–10 (2013)
Yi, F., Shui, Y., Zhou, W., Hai, J., Bonti, A.: Source-based filtering scheme against DDoS attacks. Int. J. Datab. Theory Appl. 1(1), 9–20 (2011)
Gavaskar, S., Surendiran, R., Ramaraj, E.: Three counter defense mechanism for TCP SYN flooding attacks. Int. J. Comput. Appl. 6(6), 12–15 (2010)
Choi, J., Chang, C., Yim, K., Kim, J., Kim, P.: Intelligent reconfigurable method of cloud computing resources for multimedia data delivery. Informatica 24(3), 381–394 (2013)
Zaharia, M., Das, T., Li, H., Hunter, T., Shenker, S., Stoica, I.: Discretized streams: fault-tolerant streaming computation at scale. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, pp. 423–438 (2013)
Lee, Y., Lee, Y.: Toward scalable internet traffic measurement and analysis with hadoop. ACM SIGCOMM Comput. Commun. Rev. 43(1), 5–13 (2013)
Rettig, L., Khayati, M., Cudre-Mauroux, P., Piorkowski, M.: Online anomaly detection over big data streams. In: 2015 IEEE International Conference on Big Data (Big Data) (2015)
Zhang, J., Zhang, Y., Liu, P., He, J.: A spark-based DDoS attack detection model in cloud services. In: Bao, F., Chen, L., Deng, R.H., Wang, G. (eds.) ISPEC 2016. LNCS, vol. 10060, pp. 48–64. Springer, Cham (2016). doi:10.1007/978-3-319-49151-6_4
Han, S.C., Seo, I., Lee, H.: Cylindrical coordinates security visualization for multiple domain command and control botnet detection. Comput. Secur. 46, 141–153 (2014)
https://www.openhub.net/p/bonesi. Accessed 20 Feb 2017
http://www.docin.com/p-1631407325.html. Accessed 8 May 2017
Acknowledgments
This work is partially supported by the Planned Science and Technology Project of Hunan Province, China (NO.2015JC3044), the National Natural Science Foundation of China (NO.61272147), and the National Science Fund for Young Scholars (NO.61309009).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jin, Y., Liang, Q., Zhang, J., Jin, O. (2017). A Real-Time Visualization Defense Framework for DDoS Attack. In: Zou, B., Li, M., Wang, H., Song, X., Xie, W., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 727. Springer, Singapore. https://doi.org/10.1007/978-981-10-6385-5_29
Download citation
DOI: https://doi.org/10.1007/978-981-10-6385-5_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6384-8
Online ISBN: 978-981-10-6385-5
eBook Packages: Computer ScienceComputer Science (R0)