Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment

被引:0
|
作者
Sekaran, Kaushik [1 ]
Vikram, G. Raja [1 ]
Chowdar, B. V. [1 ]
Raju, U. N. P. Gangadhar [1 ]
机构
[1] Vignan Inst Technol & Sci, Hyderabad, Telangana, India
关键词
Cloud computing; distributed denial of service (DDOS) attacks; load balancing; Hadoop cluster; HTTP requests;
D O I
10.1145/3284497.3284513
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Security threats in the cloud computing are drastically growing as the number of cloud resource usages are increasing continuously for various services. The analysis is significant as the rate of increase of DDOS attacks has been increasing over the past few years and no effective system has yet been developed to safeguard our systems against potential attackers. It presents a highlight of the challenges, which are caused by these attacks, and discusses the various scenarios of tackling them. It recognizes the limitation and strengths of each strategy, which have been introduced thus far to combat DDOS attacks. This paper provides the existing countermeasures under one roof and discusses the effectiveness of each methodology. This survey will help in the further development of measures to reduce and eventually prevent DDOS attacks, thereby making the Internet a more secure network. This paper analyzes and reviews various methods used to mitigate distributed denial of service (DDOS) attacks by using load balanced hadoop clustering mechanism to filter HTTP (Hypertext Transfer Protocol) requests to avoid and fight against DDOS attacks.
引用
下载
收藏
页码:77 / 81
页数:5
相关论文
共 50 条
  • [1] Distributed Denial of Service Attacks in Cloud Computing
    Abusaimeh, Hesham
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 163 - 168
  • [2] Defence for Distributed Denial of Service Attacks in Cloud Computing
    Carlin, Andrew
    Hammoudeh, Mohammad
    Aldabbas, Omar
    INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 : 490 - 497
  • [3] Methods for Preventing Distributed Denial of Service Attacks in Cloud Computing
    Jaber, Aws Naser
    Zolkipli, Mohamad Fadli
    Majid, Mazlina Abdul
    Anwar, Shahid
    ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5282 - 5285
  • [4] Distributed denial of service attacks detection in cloud computing using extreme learning machine
    Kushwah, Gopal Singh
    Ali, Syed Taqi
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 23 (03) : 328 - 351
  • [5] Review on Mitigation of Distributed Denial of Service (DDoS) Attacks in Cloud Computing
    Khadke, Ashwini
    Madankar, Mangala
    Motghare, Manish
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [6] Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment
    Gaurav, Akshat
    Gupta, B. B.
    Hsu, Ching-Hsien
    Perakovic, Dragan
    Penalvo, Francisco Jose Garcia
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [7] Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy
    Alashhab, Ziyad R.
    Anbar, Mohammed
    Singh, Manmeet Mahinderjit
    Hasbullah, Iznan H.
    Jain, Prateek
    Al-Amiedy, Taief Alaa
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [8] Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
    Yan, Qiao
    Yu, F. Richard
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) : 52 - 59
  • [9] A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments
    Dong, Shi
    Abbas, Khushnood
    Jain, Raj
    IEEE ACCESS, 2019, 7 : 80813 - 80828
  • [10] Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
    Jeyanthi, N.
    Barde, Uttara
    Sravani, M.
    Tiwari, Venu
    Iyengar, N. Ch. Sriman Narayana
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2013, 11 (03) : 262 - 279