Detection of application layer DDoS attacks using big data technologies

Abstract In today’s age, where data is of prime importance and rate at which data generated and sources of data generation is quite huge. The attacks on the data have increased manifold due to which its security is of prime importance. The traditional defense mechanisms are proving to be inadequate. In this paper, a new method to analyses network logs using R and Big data technologies is introduced. The approach detects fraudulent ip address in the network logs based on a set of conditions using pig scripting language. The results of using this method to detect the attack on the dataset is also presented.

[1]  P. Santhi Thilagam,et al.  DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications , 2019, IEEE Communications Surveys & Tutorials.

[2]  Tanmay De,et al.  Mathematical modelling of DDoS attack and detection using correlation , 2017 .

[3]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[4]  Manish Kumar,et al.  A review of detection approaches for distributed denial of service attacks , 2017 .

[5]  Xiaohong Yuan,et al.  Network security analysis using Big Data technology , 2016, SoutheastCon 2016.

[6]  Costas Lambrinoudakis,et al.  Survey of security vulnerabilities in session initiation protocol , 2006, IEEE Communications Surveys & Tutorials.

[7]  KumarKrishan,et al.  Application layer HTTP-GET flood DDoS attacks , 2017 .

[8]  Nils Gruschka,et al.  A survey of attacks on web services , 2009, Computer Science - Research and Development.

[9]  Nitin Pise,et al.  Solving Cyber Security Challenges using Big Data , 2016 .

[10]  Youngseok Lee,et al.  Detecting DDoS attacks with Hadoop , 2011, CoNEXT '11 Student.

[11]  Gulshan Kumar,et al.  Denial of service attacks – an updated perspective , 2016 .

[12]  Paramvir Singh,et al.  Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges , 2017, Comput. Secur..

[13]  Dhruba K. Bhattacharyya,et al.  DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance , 2016 .