International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3651
HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS
Attacks in Cloud
S.Ezhilarasi
1
1
Assistant Professor, Department of CSE, Velammal college of Engineering and Technology,
Madurai, TamilNadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Hadoop is a cloud framework that supports the
processing of large datasets in a distributed computing
environment. Mapreduce technique is being used in hadoop for
processing and generating large datasets. A key benefit of
mapreduce is that it automatically handles failures and hides
the complexity of fault tolerance from the user. DDoS attacks
have a history of flooding the victim network with an
enormous number of packets, hence exhausting the resources
and preventing the legitimate users to access them. After
having standard DDoS defense mechanism, still attackers are
able to launch an attack. A novel scheme is proposed to detect
DDoS attack efficiently by using MapReduce programming
model, SAMR (Self Adaptive MapReduce) scheduling algorithm
is being introduced which can find slow tasks dynamically by
using the historical information recorded on each node to tune
parameters. SAMR reduces the execution time when compared
with existing systems.
Key Words: DDoS, Hadoop, Map Reduce, Cloud
Computing, SAMR, MST
1. INTRODUCTION
Mapreduce is used in cloud computing because of hiding the
complexity of fault tolerance from the programmer. SAMR
mapreduce scheduling technique is being developed which
uses the historical information and find the slow nodes and
launches backup tasks. The historical information is stored
in each nodes in XML format. It adjusts time weight of each
stage of map and reduce tasks according to the historical
information respectively. It decreases the execution time of
mapreduce job and improve the overall mapreduce
performance in the heterogeneous environment. In this
paper we are tuning the parameters using Minimum
Spanning Tree(MST) clustering technique and then assigning
tasks to each node thus improving the performance of
hadoop in the heterogenous environment. With HDFS
federation, multiple Namenode servers manage namespaces
and this allows for horizontal scaling and performance
improvements
1.1 Distributed denial of service (DDoS) attacks
DDoS attack is a distributed, large scale coordinated at-tempt
of flooding the network with an enormous amount of packets
which is difficult for victim network to han-dle, and hence
the victim becomes unable to provide the services to its
legitimate user and also the network performance is greatly
deteriorated. This attack exhausts the resources of the victim
network such as bandwidth, memory, computing power etc.
The system which suffers from attacked or whose services
are attacked is called as Dzprimary victimdz and on other hand
Dzsecondary victimsdz is the system that is used to originate
the attack. These secondary victims provide the attacker, the
ability to wage a more powerful DDoS attack as it is difficult
to track down the real attacker. Denial of Service (DoS)
attacks is used to consume all the resources of the target
machine ȋvictimǯs servicesȌ Distributed denial of service
(DDoS) attack is some sort of malicious activity or a typical
behavior, which cooperate the availability of the serverǯs
resources and prevents the legitimate users from using the
service. DDOS attacks are not meant to alter data contents or
achieve illegal access, but in that place they target to crash
the servers, generally by temporarily interrupting or
suspending the services of a host connected to the Internet.
DOS attacks can occur from either a single source or multiple
sources. Multiple source DOS attacks are called distributed
denial-of service (DDOS) attacks.
A Denial of Service (DoS) attack is an attempt to
make a computer resource unavailable to normal users. The
Dos attacks are becoming more powerful due to bot
behavior. Attack that leverages multiple sources to create
the denial-of-service condition is known as The Distributed
Denial of Service (DDoS) attack. DDoS attacks are big threats
to internet services. HTTP flooding attack is one of the
typical DDos attack, in that hosts are sending large amount of
request to target website to exhaust its resources
[1]
. Now a
day there is massive growth in internet traffic. Due to this
many DDoS attack detection systems facing a problem. A
Distributed Denial of service (DDos) attack can employ
hundreds or even thousands of computers that have been
previously flooded by HTTP GET packet.
Fig.1. Architecture of DOS