Combating Distributed Denial of Service Attacks Using Load Balanced Hadoop Clustering in Cloud Computing Environment

被引:0
|
作者
Sekaran, Kaushik [1 ]
Vikram, G. Raja [1 ]
Chowdar, B. V. [1 ]
Raju, U. N. P. Gangadhar [1 ]
机构
[1] Vignan Inst Technol & Sci, Hyderabad, Telangana, India
关键词
Cloud computing; distributed denial of service (DDOS) attacks; load balancing; Hadoop cluster; HTTP requests;
D O I
10.1145/3284497.3284513
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Security threats in the cloud computing are drastically growing as the number of cloud resource usages are increasing continuously for various services. The analysis is significant as the rate of increase of DDOS attacks has been increasing over the past few years and no effective system has yet been developed to safeguard our systems against potential attackers. It presents a highlight of the challenges, which are caused by these attacks, and discusses the various scenarios of tackling them. It recognizes the limitation and strengths of each strategy, which have been introduced thus far to combat DDOS attacks. This paper provides the existing countermeasures under one roof and discusses the effectiveness of each methodology. This survey will help in the further development of measures to reduce and eventually prevent DDOS attacks, thereby making the Internet a more secure network. This paper analyzes and reviews various methods used to mitigate distributed denial of service (DDOS) attacks by using load balanced hadoop clustering mechanism to filter HTTP (Hypertext Transfer Protocol) requests to avoid and fight against DDOS attacks.
引用
收藏
页码:77 / 81
页数:5
相关论文
共 50 条
  • [31] Protecting against distributed denial of service (DDoS) attacks using distributed filtering
    Trostle, Jonathan
    2006 SECURECOMM AND WORKSHOPS, 2006, : 201 - 211
  • [32] Mitigation Services on SDN for Distributed Denial of Service and Denial of Service Attacks Using Machine Learning Techniques
    Ramprasath, J.
    Krishnaraj, N.
    Seethalakshmi, V.
    IETE JOURNAL OF RESEARCH, 2024, 70 (01) : 70 - 81
  • [33] Load-Balanced Cloud Service Interface for the HiBA Mobile Cloud Environment
    Lin, Tzu-Chao
    Pai, Mao-Yuan
    Chen, Chao-Lieh
    Chen, Chao-Chun
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 360 - 361
  • [34] DISTRIBUTED DENIAL OF SERVICE (DDOS) NETWORK ATTACKS: IMPACT ON THE VIRTUAL LEARNING ENVIRONMENT
    Atayero, A. A.
    Oshin, O. I.
    Oshin, B. O.
    Alatishe, A. S.
    ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, : 2235 - 2240
  • [35] Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud
    Lonea, Alina Madalina
    Popescu, Daniela Elena
    Prostean, Octavian
    Tianfield, Huaglory
    SOFT COMPUTING APPLICATIONS, 2013, 195 : 367 - 379
  • [36] Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
    Bhardwaj, Aanshi
    Mangat, Veenu
    Vig, Renu
    Halder, Subir
    Conti, Mauro
    COMPUTER SCIENCE REVIEW, 2021, 39
  • [37] Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks
    Velliangiri, S.
    Karthikeyan, P.
    Vinoth Kumar, V.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2021, 33 (03) : 405 - 424
  • [38] Distributed Denial of Service Attacks Detection Using Support Vector Machine
    Ahmad, Iftikhar
    Abdullah, Azween B.
    Alghamdi, Abdullah S.
    Hussain, Muhammad
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 127 - 134
  • [39] Using transient behavior of TCP in mitigation of distributed denial of service attacks
    Kalantari, M
    Gallicchio, K
    Shayman, MA
    PROCEEDINGS OF THE 41ST IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-4, 2002, : 1422 - 1427
  • [40] On detecting distributed denial of service attacks using fuzzy inference system
    Almseidin, Mohammad
    Al-Sawwa, Jamil
    Alkasassbeh, Mouhammd
    Alweshah, Mohammed
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02): : 1337 - 1351