Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment

被引:0
|
作者
Sekaran, Kaushik [1 ]
Vikram, G. Raja [1 ]
Chowdar, B. V. [1 ]
Raju, U. N. P. Gangadhar [1 ]
机构
[1] Vignan Inst Technol & Sci, Hyderabad, Telangana, India
关键词
Cloud computing; distributed denial of service (DDOS) attacks; load balancing; Hadoop cluster; HTTP requests;
D O I
10.1145/3284497.3284513
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Security threats in the cloud computing are drastically growing as the number of cloud resource usages are increasing continuously for various services. The analysis is significant as the rate of increase of DDOS attacks has been increasing over the past few years and no effective system has yet been developed to safeguard our systems against potential attackers. It presents a highlight of the challenges, which are caused by these attacks, and discusses the various scenarios of tackling them. It recognizes the limitation and strengths of each strategy, which have been introduced thus far to combat DDOS attacks. This paper provides the existing countermeasures under one roof and discusses the effectiveness of each methodology. This survey will help in the further development of measures to reduce and eventually prevent DDOS attacks, thereby making the Internet a more secure network. This paper analyzes and reviews various methods used to mitigate distributed denial of service (DDOS) attacks by using load balanced hadoop clustering mechanism to filter HTTP (Hypertext Transfer Protocol) requests to avoid and fight against DDOS attacks.
引用
下载
收藏
页码:77 / 81
页数:5
相关论文
共 50 条
  • [21] Chaotic Theory based Defensive Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment
    Iyengar, N. Ch. S. N.
    Ganapathy, Gopinath
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 197 - 211
  • [22] A Distributed Denial of Service Attack Sources Detection Technology for Cloud Computing
    Yang, Wenjun
    Wei, Dan
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 660 - 664
  • [23] Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud
    Alosaimi, Wael
    Alshamrani, Mazin
    Al-Begain, Khalid
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 60 - 65
  • [24] Using client puzzles to mitigate distributed denial of service attacks in the tor anonymous routing environment
    Fraser, Nicholas A.
    Kelly, Douglas J.
    Raines, Richard A.
    Baldwin, Rusty O.
    Mullins, Barry E.
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1197 - 1202
  • [25] Classifying different denial-of-service attacks in cloud computing using rule-based learning
    Khorshed, Md Tanzim
    Ali, A. B. M. Shawkat
    Wasimi, Saleh A.
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1235 - 1247
  • [26] Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine
    Kushwah, Gopal Singh
    Ranga, Virender
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2021, 29 (04) : 1852 - 1870
  • [27] Using active networking to thwart distributed denial of service attacks
    Shyne, S
    Hovak, A
    Riolo, J
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 1103 - 1108
  • [28] An analysis of using reflectors for distributed denial-of-service attacks
    Paxson, V
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (03) : 38 - 47
  • [29] Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
    Bhushan, Kriti
    Gupta, B. B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1985 - 1997
  • [30] Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
    Kriti Bhushan
    B. B. Gupta
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1985 - 1997