International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3651 HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks in Cloud S.Ezhilarasi 1 1 Assistant Professor, Department of CSE, Velammal college of Engineering and Technology, Madurai, TamilNadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Hadoop is a cloud framework that supports the processing of large datasets in a distributed computing environment. Mapreduce technique is being used in hadoop for processing and generating large datasets. A key benefit of mapreduce is that it automatically handles failures and hides the complexity of fault tolerance from the user. DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defense mechanism, still attackers are able to launch an attack. A novel scheme is proposed to detect DDoS attack efficiently by using MapReduce programming model, SAMR (Self Adaptive MapReduce) scheduling algorithm is being introduced which can find slow tasks dynamically by using the historical information recorded on each node to tune parameters. SAMR reduces the execution time when compared with existing systems. Key Words: DDoS, Hadoop, Map Reduce, Cloud Computing, SAMR, MST 1. INTRODUCTION Mapreduce is used in cloud computing because of hiding the complexity of fault tolerance from the programmer. SAMR mapreduce scheduling technique is being developed which uses the historical information and find the slow nodes and launches backup tasks. The historical information is stored in each nodes in XML format. It adjusts time weight of each stage of map and reduce tasks according to the historical information respectively. It decreases the execution time of mapreduce job and improve the overall mapreduce performance in the heterogeneous environment. In this paper we are tuning the parameters using Minimum Spanning Tree(MST) clustering technique and then assigning tasks to each node thus improving the performance of hadoop in the heterogenous environment. With HDFS federation, multiple Namenode servers manage namespaces and this allows for horizontal scaling and performance improvements 1.1 Distributed denial of service (DDoS) attacks DDoS attack is a distributed, large scale coordinated at-tempt of flooding the network with an enormous amount of packets which is difficult for victim network to han-dle, and hence the victim becomes unable to provide the services to its legitimate user and also the network performance is greatly deteriorated. This attack exhausts the resources of the victim network such as bandwidth, memory, computing power etc. The system which suffers from attacked or whose services are attacked is called as Dzprimary victimdz and on other hand Dzsecondary victimsdz is the system that is used to originate the attack. These secondary victims provide the attacker, the ability to wage a more powerful DDoS attack as it is difficult to track down the real attacker. Denial of Service (DoS) attacks is used to consume all the resources of the target machine ȋvictimǯs servicesȌ Distributed denial of service (DDoS) attack is some sort of malicious activity or a typical behavior, which cooperate the availability of the serverǯs resources and prevents the legitimate users from using the service. DDOS attacks are not meant to alter data contents or achieve illegal access, but in that place they target to crash the servers, generally by temporarily interrupting or suspending the services of a host connected to the Internet. DOS attacks can occur from either a single source or multiple sources. Multiple source DOS attacks are called distributed denial-of service (DDOS) attacks. A Denial of Service (DoS) attack is an attempt to make a computer resource unavailable to normal users. The Dos attacks are becoming more powerful due to bot behavior. Attack that leverages multiple sources to create the denial-of-service condition is known as The Distributed Denial of Service (DDoS) attack. DDoS attacks are big threats to internet services. HTTP flooding attack is one of the typical DDos attack, in that hosts are sending large amount of request to target website to exhaust its resources [1] . Now a day there is massive growth in internet traffic. Due to this many DDoS attack detection systems facing a problem. A Distributed Denial of service (DDos) attack can employ hundreds or even thousands of computers that have been previously flooded by HTTP GET packet. Fig.1. Architecture of DOS