HADEC: Hadoop-based live DDoS detection framework

被引:27
|
作者
Hameed, Sufian [1 ]
Ali, Usman [1 ]
机构
[1] Natl Univ Comp & Emerging Sci NUCES, IT Secur Labs, Karachi, Pakistan
关键词
DDoS; Flooding attacks; DDoS detection; Hadoop;
D O I
10.1186/s13635-018-0081-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed denial of service (DDoS) flooding attacks are one of the main methods to destroy the availability of critical online services today. These DDoS attacks cannot be prevented ahead of time, and once in place, they overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication or crashes it completely. Any delays in detecting the flooding attacks completely halts the network services. With the rapid increase of DDoS volume and frequency, the new generation of DDoS detection mechanisms are needed to deal with huge attack volume in reasonable and affordable response time. In this paper, we propose HADEC, a Hadoop-based live DDoS detection framework to tackle efficient analysis of flooding attacks by harnessing MapReduce and HDFS. We implemented a counter-based DDoS detection algorithm for four major flooding attacks (TCP-SYN, HTTP GET, UDP, and ICMP) in MapReduce, consisting of map and reduce functions. We deployed a testbed to evaluate the performance of HADEC framework for live DDoS detection on low-end commodity hardware. Based on the experiment, we showed that HADEC is capable of processing and detecting DDoS attacks in near to real time.
引用
下载
收藏
页数:19
相关论文
共 50 条
  • [31] Design of Effective Indexing Technique in Hadoop-Based Database
    Shim, Jae-Sung
    Jang, Young-Hwan
    Ju, Yong-Wan
    Park, Seok-Cheon
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 90 - 95
  • [32] Hadoop-Based Distributed Sensor Node Management System
    Jung, In-Yong
    Kim, Ki-Hyun
    Han, Byong-John
    Jeong, Chang-Sung
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [33] Hadoop-based replica exchange over heterogeneous distributed cyberinfrastructures
    Platania, Richard
    Shams, Shayan
    Chiu, Chui-Hui
    Kim, Nayong
    Kim, Joohyun
    Park, Seung-Jong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (04):
  • [34] Hadoop-based ARIMA algorithm and its application in weather forecast
    Li, Leixiao
    Ma, Zhiqiang
    Liu, Limin
    Fan, Yuhong
    Li, L. (llxhappy@126.com), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (06): : 119 - 132
  • [35] A Hadoop-Based Method to Predict Potential Effective Drug Combination
    Sun, Yifan
    Xiong, Yi
    Xu, Qian
    Wei, Dongqing
    BIOMED RESEARCH INTERNATIONAL, 2014, 2014
  • [36] Development and Application of Personal Hadoop-Based Big Data Platform
    Wu G.
    Lin F.
    Chang W.-Y.
    Tsai W.-F.
    Lin S.-C.
    Yang C.-T.
    Journal of the Chinese Institute of Civil and Hydraulic Engineering, 2018, 30 (02): : 107 - 120
  • [37] High Throughput WAN Data Transfer with Hadoop-based Storage
    Amin, A.
    Bockelman, B.
    Letts, J.
    Levshina, T.
    Martin, T.
    Pi, H.
    Sfiligoi, I.
    Thomas, M.
    Wueerthwein, F.
    INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2010), 2011, 331
  • [38] Exploratory Research on Developing Hadoop-based Data Analytics Tools
    Palit, Henry Novianus
    Dewi, Lily Puspa
    Handojo, Andreas
    Basuki, Kenny
    Mirabel, Mikiavonty Endrawati
    2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING, INTELLIGENT SYSTEM AND INFORMATION TECHNOLOGY (ICSIIT), 2017, : 160 - 166
  • [39] A Hadoop based analysis and detection model for IP Spoofing typed DDoS attack
    Zhang, Jian
    Liu, Pin
    He, Jianbiao
    Zhang, Yawei
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1976 - 1983
  • [40] A Neural-Network Based DDoS Detection System Using Hadoop And HBase
    Zhao, Teng
    Lo, Dan Chia-Tien
    Qian, Kai
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1326 - 1331