Journal of Information Security

Volume 4, Issue 3 (July 2013)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks

HTML  Download Download as PDF (Size: 582KB)  PP. 150-164  
DOI: 10.4236/jis.2013.43018    7,913 Downloads   14,830 Views  Citations

ABSTRACT

Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defense mechanism, still attackers are able to launch an attack. These inadequate defense mechanisms need to be improved and integrated with other solutions. The purpose of this paper is to study the characteristics of DDoS attacks, various models involved in attacks and to provide a timeline of defense mechanism with their improvements to combat DDoS attacks. In addition to this, a novel scheme is proposed to detect DDoS attack efficiently by using MapReduce programming model.

Share and Cite:

S. Tripathi, B. Gupta, A. Almomani, A. Mishra and S. Veluru, "Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks," Journal of Information Security, Vol. 4 No. 3, 2013, pp. 150-164. doi: 10.4236/jis.2013.43018.

Cited by

[1] Cloud data assured deletion scheme based on dynamic sliding window
Peer-to-Peer Networking and Applications, 2022
[2] A Comparative Analysis of Machine Learning-Based Website Phishing Detection Using URL Information
2022 5th International …, 2022
[3] DDoSDet: An approach to Detect DDoS attacks using Neural Networks
arXiv preprint arXiv:2201.09514, 2022
[4] Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue
Journal of Information Security, 2022
[5] Detection of DDOS Attack Using IDS Mechanism: A Review
2022 1st International …, 2022
[6] Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
Cyber Security, Privacy and Networking, 2022
[7] A Deep and Efficient Analysis of DDOS Attack in Software Defined Network
2022
[8] Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks
International Conference on …, 2021
[9] Decentralized approach for data security of Medical IoT Devices
… Conference on Smart …, 2021
[10] The Presentation of a New Defense Framework Against the Distributed Denial of Service Attacks Using the Software Defined Network
journal of Advanced …, 2021
[11] An Integrated BIM-IoT approach to support energy monitoring
… Conference on Smart …, 2021
[12] A big data and deep learning based approach for ddos detection in cloud computing environment
2021 IEEE 10th Global …, 2021
[13] How IoT is Making DDoS Attacks More Dangerous
2021
[14] Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments
2021
[15] A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
2020
[16] Uma Metodologia para análise de incidentes de segurança da informação
2020
[17] Cross-site Scripting Attacks: Classification, Attack, and Countermeasures
2020
[18] An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
2020
[19] The detection method of low-rate DoS attack based on multi-feature fusion
2020
[20] A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
2020
[21] Ways to eliminate DDos attacks
2020
[22] A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles
2020
[23] Denial of Service Attacks: Difference in Rates, Duration, and Financial Damages and the Relationship Between Company Assets and Revenues
2020
[24] Методы обнаружения и предотвращения DDOS-атак
2019
[25] Applying Multi-Level Theory to an Information Security Incident Domain Ontology.
2019
[26] Systematic review of aspects of DDoS attacks detection
2019
[27] Applying Multi-Level Theory to an Information Security Incident Domain Ontology
2019
[28] A Review on Detection of DDOS Attack Using Machine Learning and Deep Learning Techniques
2019
[29] Développement d'un protocole SCADA temps réel sécurisé à base de l'IEC 60870-5-101
2019
[30] Smart Card Security: Applications, Attacks, and Countermeasures
2019
[31] DDoS Attacks—Analysis and Prevention
Innovations in Computer Science and Engineering, 2019
[32] The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy
2018
[33] An efficient index structure for distributed k-nearest neighbours query processing
Soft Computing, 2018
[34] Fixing the Cloud Forensic Problem with Blockchain
2018
[35] Multi-agent-based DDoS detection on big data systems
2018
[36] Security Analytics Tools and Implementation Success Factors: Instrument Development Using Delphi Approach and Exploratory Factor Analysis
2018
[37] Could Block Chain Technology Help Resolve the Cloud Forensic Problem?
2018
[38] Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
2018
[39] Researching Cyber Weapons: An Enumerative Bibliography
Cyber Weaponry, 2018
[40] Network Anomaly Detection and Prevention using Statistical and Machine Learning Approaches
2018
[41] Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
2018
[42] A Game Theory Model for Detection and Mitigation of Ddos Attacks on Web Servers
2018
[43] Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy.
2017
[44] Collaborative detection and filtering techniques against denial of service attacks in cloud computing
2017
[45] DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
Security and Communication Networks, 2017
[46] COLLABORATIVE DETECTION AND FILTERING TECHNIQUES AGAINST DENIAL OF SERVICE ATTACKS IN CLOUD COMPUTING.
Journal of Theoretical and Applied Information Technology, 2017
[47] Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Security and Communication Networks, 2017
[48] Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks
2017
[49] Foreword
2017
[50] Data-Driven Anomaly Detection in Industrial Networks
2017
[51] An Empirical Study of The Impact of DoS, DDoS Attacks on Various Web Servers and Application Servers
Journal of Science and Technology on Information Security, 2017
[52] Denial of service attacks detection using synchronization packets analysis
2017
[53] Designing a Robust Closed-Loop Intrusion Detection Predictive Model Using Signal Processing Techniques in Cloud Computing Environment
2017
[54] Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy
Wireless Personal Communications, 2017
[55] HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
Security and Communication Networks, 2016
[56] Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce
International Journal of Data Warehousing and Mining (IJDWM), 2016
[57] Graphics processing unit based next generation DDoS prevention system
2016
[58] Comparative analysis of features based machine learning approaches for phishing detection
2016
[59] A survey of cloud-based network intrusion detection analysis
2016
[60] BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
2016
[61] Recent survey of various defense mechanisms against phishing attacks
Journal of Information Privacy and Security, 2016
[62] Bigdata platform based approach for defending against DDoS
Int'l Conf. on Advances in Big Data Analytics, 2016
[63] Securing cloud computing.
2016
[64] Distributed Denial of Service Prevention Techniques
2015
[65] A Novel approach for Detection of Distributed Denial of Service attack in VANET
International Journal of Computer Applications, 2015
[66] Intrusion Detection and Countermeasure of Virtual Cloud Systems-State of the Art and Current Challenges
International Journal of Advanced Computer Science and Applications, 2015
[67] Safety of data warehouse for remote laboratories in Laboratory Management System and network of road junctions
2015
[68] Distributed Denial of Service (DDOS) Attack, Networks, Tools and DEFENSE.
International Journal of Applied Engineering Research, 2015
[69] Defending Against DDOS Flooding Attacks-A Data Streaming Approach
2015
[70] Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
International Journal of Engineering Research and Technology, 2015
[71] Similarity Detection via Random Subsets for Cyber War Protection in Big Data using Hadoop Framework
2015
[72] Defence for Distributed Denial of Service Attacks in Cloud Computing
Procedia Computer Science, 2015
[73] DDoS detection and filtering technique in cloud environment using GARCH model
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), 2015
[74] A Proactive Approach to Intrusion Detection in Cloud Software as a Service
Achieving Enterprise Agility through Innovative Software Development, 2015
[75] Botnet-originated DDoS attacks: Overview and Mitigation
2015
[76] Detection of DDoS attack in VANET using LPN (Local Protection Node)
2015
[77] THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
2014
[78] Defense against DoS attack: PSO approach in virtualization
2014
[79] Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach
2014
[80] An Efficient Attack Resistance Model Using Application Based Polynomial Distribution
2014
[81] Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed
International Journal of Fuzzy Systems, 2014
[82] Cyber Conflict Bibliography
GWU Legal Studies Research Paper, 2013
[83] Digital compensation for timing mismatches in interleaved ADCs
2013
[84] Analysis of Machine Learning Based DDoS Attack Detection Techniques in Software Defined Network
[85] IoT Security using Machine Learning Techniques
[86] Cyber Security Traits of a Future-Ready Organization
[87] Analysis of Machine learning based XSS attack Detection Techniques
[88] Cyber Security, Laws & Policy: A Study
[89] Advancement of Cloud Computing and Big Data Analytics in Healthcare Sector Security
[90] Challenges of the System and Network Administration
[91] Efficient graphics processing unit based algorithms for high-throughput communication systems
[92] DDOS attack detection and prevention methods

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.