skip to main content
10.1145/3284497.3284513acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdteConference Proceedingsconference-collections
research-article

Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment

Authors Info & Claims
Published:10 October 2018Publication History

ABSTRACT

The Security threats in the cloud computing are drastically growing as the number of cloud resource usages are increasing continuously for various services. The analysis is significant as the rate of increase of DDOS attacks has been increasing over the past few years and no effective system has yet been developed to safeguard our systems against potential attackers. It presents a highlight of the challenges, which are caused by these attacks, and discusses the various scenarios of tackling them. It recognizes the limitation and strengths of each strategy, which have been introduced thus far to combat DDOS attacks. This paper provides the existing countermeasures under one roof and discusses the effectiveness of each methodology. This survey will help in the further development of measures to reduce and eventually prevent DDOS attacks, thereby making the Internet a more secure network. This paper analyzes and reviews various methods used to mitigate distributed denial of service (DDOS) attacks by using load balanced hadoop clustering mechanism to filter HTTP (Hypertext Transfer Protocol) requests to avoid and fight against DDOS attacks.

References

  1. Hunter, P. (2003). Distributed Denial of Service (DDOS) Mitigation Tools. Network Security, 2003(5), 12--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Beitollahi, H., & Deconinck, G. (2012). Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communications, 35(11), 1312--1332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Lee, K., Kim, J., Kwon, K. H., Han, Y., & Kim, S. (2008). DDoS attack detection method using cluster analysis. Expert Systems with Applications, 34(3), 1659--1665. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Agarwal, S., Dawson, T., & Tryfonas, C. (2003). DDoS mitigation via regional cleaning centers. Sprint ATL Research Report RR04-ATL-013177.Google ScholarGoogle Scholar
  5. Yaar, A., Perrig, A., & Song, D. (2004, May). SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on (pp. 130--143). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  6. Y. Chen, K. Hwang, W.-S. Ku, Collaborative detection of DDoS attacks over multiple network domains, IEEE Transactions on Parallel and Distributed Systems 18 (12) (2007) 1649--1662. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, Statistical approaches to DDoS attack detection and response, in: Proceedings of DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 2003, pp. 303--314.Google ScholarGoogle ScholarCross RefCross Ref
  8. A.L. Toledo, X. Wang, Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks, IEEE Transactions on Information Forensics and Security 3 (3) (2008) 347--358 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sekaran, K. and Krishna, P.V., 2017. "Cross region load balancing of tasks using region-based rerouting of loads in cloud computing environment", International Journal of Advanced Intelligence Paradigms, Vol 9(5-6), pp.589--603. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM, San Diego, California, USA., 2001, pp. 15--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sekaran Kaushik and P. Venkata Krishna. "Big Cloud: a hybrid cloud model for secure data storage through cloud space." International Journal of Advanced Intelligence Paradigms Vol 8, no. 2 (2016), 229--241. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Zhang, M. Parashar, Cooperative defence against DDoS attacks, Journal of Research and Practice in Information Technology 38 (1) (2006) 69--84.Google ScholarGoogle Scholar
  13. Kaushik, S., Singh, S. and Pathan, R.K., 2017, April. Design of novel cloud architecture for energy aware cost computation in cloud computing environment. In Power and Advanced Computing Technologies (i-PACT), 2017 Innovations in (pp. 1--6). IEEE.Google ScholarGoogle Scholar
  14. W.G. Morein, A. Stavrou, D.L. Cook, A.D. Keromytis, V. Misra, D. Rubensteiny, Using graphic turing tests to counter automated DDoS attacks against web servers, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, pp. 8--19. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICDTE '18: Proceedings of the 2nd International Conference on Digital Technology in Education
      October 2018
      96 pages
      ISBN:9781450365994
      DOI:10.1145/3284497

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader