International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1594 EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based attacks in Cloud using MapReduce S.Ezhilarasi 1 1 Assistant Professor, Department of CSE, Velammal college of Engineering and Technology, Madurai, TamilNadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Security assurance in the Cloud Service is a major challenge for the Providers. The Security can be administered in the Cloud at various levels and for several types of attacks. This study proposes a method of integration between HTTP GET flooding among DDOS attacks and MapReduce processing for a fast attack detection in cloud computing environment. This method is possible to ensure the availability of the target system for accurate and reliable detection based on HTTP GET flooding. This paper deals about the threats and the counter measures of the prevailing DDoS attacks on the Cloud Environment as well as the Cloud Specific Vulnerabilities to these attacks. In specific, HTTP and XMLbased DDoS attacks on the cloud service are experimented under proposed security framework for EDoS Protection. A Cloud Service was hosted on Amazon EC2. The Service was targeted by HTTP, XML DDoS attacks from several nodes, which lead to the scaling of the service by consuming more Amazon EC2 resources, which in turn lead to Economic Denial of Sustainability to the Cloud Service under attack. Thus this paper explores the transformation of traditional Distributed denial-of-service (DDoS) attack into cloud specific Economic Denial of Sustainability (EDoS) attack Key Words: DDoS attack, EDoS attack, HTTP GET Flooding Attack, Web Security, MapReduce 1.INTRODUCTION “Cloud Computing”, a new wave in the Internet revolution, transforms the kind of services provided over the Internet. The Cloud Services can be viewed from two perspectives, one as Cloud Service Provider and the other as Cloud Service Consumer. The Security can be administered in the Cloud at various levels and for several types of attacks. The threats and the attacks on the Cloud service can be common prevailing attacks in the internet or can be cloud specific. Cloud Computing is a heterogeneously distributed environment, which provides highly scalable, elastic and always available resources as service through Internet. The cloud computing provides everything as a service. In cloud computing, large pools of resources are available and it is allocated dynamically to the applications. The cloud infrastructure is fully virtualized to utilize the hardware effectively. The cloud infrastructure supports all hardware architectures [1].The cloud middleware provides an abstraction to the underlying physical cloud resources. Thus providing security to cloud is a complicated issue. The papers [3][4][5][6] give an clear idea about the security issues related to cloud computing. Further Cloud Security Alliance (CSA) give us the areas for security needed in cloud computing [7]. DDos attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet [8] [9] [2]. Web applications attacks are difficult to distinguish between normal traffic and DDoS. Also, the Target system can be affected regardless of hardware performance because target server can be damaged by small connections and traffics. This study proposes a method of integration between HTTP GET flooding among DDOS attacks and MapReduce processing [6] [2] for a fast attack detection in cloud computing environment. This method is possible to ensure the availability of the target system for accurate and reliable detection based on HTTP GET flooding. 1.1 Distributed denial of service (DDoS) attacks DDoS attack is a distributed, large scale coordinated at- tempt of flooding the network with an enormous amount of packets which is difficult for victim network to han-dle, and hence the victim becomes unable to provide the services to its legitimate user and also the network performance is greatly deteriorated. This attack exhausts the resources of the victim network such as bandwidth, memory, computing power etc. The system which suffers from attacked or whose services are attacked is called as “primary victim” and on other hand “secondary victims” is the system that is used to originate the attack. These secondary victims provide the attacker, the ability to wage a more powerful DDoS attack as it is difficult to track down the real attacker. Denial of Service (DoS) attacks is used to consume all the resources of the target machine (victim’s services) Distributed denial of service (DDoS) attack is some sort of malicious activity or a typical behavior, which cooperate the availability of the server’s resources and prevents the legitimate users from using the service. DDOS attacks are not meant to alter data contents or achieve illegal access, but in that place they target to crash the servers, generally by temporarily interrupting or suspending the services of a host connected to the Internet. DOS attacks can occur from either a single source or multiple sources. Multiple source DOS attacks are called distributed denial-of service (DDOS) attacks. A Denial of Service (DoS) attack is an attempt to make a computer resource unavailable to normal users. The Dos attacks are becoming more powerful due to bot behavior. Attack that leverages multiple sources to create the denial- of-service condition is known as The Distributed Denial of Service (DDoS) attack. DDoS attacks are big threats to