ABSTRACT
The Security threats in the cloud computing are drastically growing as the number of cloud resource usages are increasing continuously for various services. The analysis is significant as the rate of increase of DDOS attacks has been increasing over the past few years and no effective system has yet been developed to safeguard our systems against potential attackers. It presents a highlight of the challenges, which are caused by these attacks, and discusses the various scenarios of tackling them. It recognizes the limitation and strengths of each strategy, which have been introduced thus far to combat DDOS attacks. This paper provides the existing countermeasures under one roof and discusses the effectiveness of each methodology. This survey will help in the further development of measures to reduce and eventually prevent DDOS attacks, thereby making the Internet a more secure network. This paper analyzes and reviews various methods used to mitigate distributed denial of service (DDOS) attacks by using load balanced hadoop clustering mechanism to filter HTTP (Hypertext Transfer Protocol) requests to avoid and fight against DDOS attacks.
- Hunter, P. (2003). Distributed Denial of Service (DDOS) Mitigation Tools. Network Security, 2003(5), 12--14. Google ScholarDigital Library
- Beitollahi, H., & Deconinck, G. (2012). Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communications, 35(11), 1312--1332. Google ScholarDigital Library
- Lee, K., Kim, J., Kwon, K. H., Han, Y., & Kim, S. (2008). DDoS attack detection method using cluster analysis. Expert Systems with Applications, 34(3), 1659--1665. Google ScholarDigital Library
- Agarwal, S., Dawson, T., & Tryfonas, C. (2003). DDoS mitigation via regional cleaning centers. Sprint ATL Research Report RR04-ATL-013177.Google Scholar
- Yaar, A., Perrig, A., & Song, D. (2004, May). SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on (pp. 130--143). IEEE.Google ScholarCross Ref
- Y. Chen, K. Hwang, W.-S. Ku, Collaborative detection of DDoS attacks over multiple network domains, IEEE Transactions on Parallel and Distributed Systems 18 (12) (2007) 1649--1662. Google ScholarDigital Library
- L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, Statistical approaches to DDoS attack detection and response, in: Proceedings of DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 2003, pp. 303--314.Google ScholarCross Ref
- A.L. Toledo, X. Wang, Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks, IEEE Transactions on Information Forensics and Security 3 (3) (2008) 347--358 Google ScholarDigital Library
- Sekaran, K. and Krishna, P.V., 2017. "Cross region load balancing of tasks using region-based rerouting of loads in cloud computing environment", International Journal of Advanced Intelligence Paradigms, Vol 9(5-6), pp.589--603. Google ScholarDigital Library
- K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM, San Diego, California, USA., 2001, pp. 15--26. Google ScholarDigital Library
- Sekaran Kaushik and P. Venkata Krishna. "Big Cloud: a hybrid cloud model for secure data storage through cloud space." International Journal of Advanced Intelligence Paradigms Vol 8, no. 2 (2016), 229--241. Google ScholarDigital Library
- G. Zhang, M. Parashar, Cooperative defence against DDoS attacks, Journal of Research and Practice in Information Technology 38 (1) (2006) 69--84.Google Scholar
- Kaushik, S., Singh, S. and Pathan, R.K., 2017, April. Design of novel cloud architecture for energy aware cost computation in cloud computing environment. In Power and Advanced Computing Technologies (i-PACT), 2017 Innovations in (pp. 1--6). IEEE.Google Scholar
- W.G. Morein, A. Stavrou, D.L. Cook, A.D. Keromytis, V. Misra, D. Rubensteiny, Using graphic turing tests to counter automated DDoS attacks against web servers, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, pp. 8--19. Google ScholarDigital Library
Index Terms
- Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment
Recommendations
An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks
By penetrating into a large number of machines and stealthily installing malicious pieces of code, a distributed denial of service (DDoS) attack constructs a hierarchical network and uses it to launch coordinated assaults. DDoS attacks often exhaust the ...
Surviving Distributed Denial-of-Service Attacks
A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The ...
Mitigating denial of service attacks: a tutorial
This tutorial describes what Denial of Service (DOS) attacks are. how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: ...
Comments