International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1594
EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based
attacks in Cloud using MapReduce
S.Ezhilarasi
1
1
Assistant Professor, Department of CSE, Velammal college of Engineering and Technology, Madurai,
TamilNadu, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Security assurance in the Cloud Service is a major
challenge for the Providers. The Security can be administered
in the Cloud at various levels and for several types of attacks.
This study proposes a method of integration between HTTP
GET flooding among DDOS attacks and MapReduce processing
for a fast attack detection in cloud computing environment.
This method is possible to ensure the availability of the target
system for accurate and reliable detection based on HTTP GET
flooding. This paper deals about the threats and the counter
measures of the prevailing DDoS attacks on the Cloud
Environment as well as the Cloud Specific Vulnerabilities to
these attacks. In specific, HTTP and XMLbased DDoS attacks
on the cloud service are experimented under proposed security
framework for EDoS Protection. A Cloud Service was hosted on
Amazon EC2. The Service was targeted by HTTP, XML DDoS
attacks from several nodes, which lead to the scaling of the
service by consuming more Amazon EC2 resources, which in
turn lead to Economic Denial of Sustainability to the Cloud
Service under attack. Thus this paper explores the
transformation of traditional Distributed denial-of-service
(DDoS) attack into cloud specific Economic Denial of
Sustainability (EDoS) attack
Key Words: DDoS attack, EDoS attack, HTTP GET Flooding
Attack, Web Security, MapReduce
1.INTRODUCTION
“Cloud Computing”, a new wave in the Internet revolution,
transforms the kind of services provided over the Internet.
The Cloud Services can be viewed from two perspectives,
one as Cloud Service Provider and the other as Cloud Service
Consumer. The Security can be administered in the Cloud at
various levels and for several types of attacks. The threats
and the attacks on the Cloud service can be common
prevailing attacks in the internet or can be cloud specific.
Cloud Computing is a heterogeneously distributed
environment, which provides highly scalable, elastic and
always available resources as service through Internet. The
cloud computing provides everything as a service. In cloud
computing, large pools of resources are available and it is
allocated dynamically to the applications. The cloud
infrastructure is fully virtualized to utilize the hardware
effectively. The cloud infrastructure supports all hardware
architectures [1].The cloud middleware provides an
abstraction to the underlying physical cloud resources. Thus
providing security to cloud is a complicated issue. The
papers [3][4][5][6] give an clear idea about the security
issues related to cloud computing. Further Cloud Security
Alliance (CSA) give us the areas for security needed in cloud
computing [7]. DDos attack is an attempt to make a machine
or network resource unavailable to its intended users.
Although the means to carry out, motives for, and targets of a
DoS attack may vary, it generally consists of efforts to
temporarily or indefinitely interrupt or suspend services of a
host connected to the Internet [8] [9] [2].
Web applications attacks are difficult to distinguish between
normal traffic and DDoS. Also, the Target system can be
affected regardless of hardware performance because target
server can be damaged by small connections and traffics.
This study proposes a method of integration between HTTP
GET flooding among DDOS attacks and MapReduce
processing [6] [2] for a fast attack detection in cloud
computing environment. This method is possible to ensure
the availability of the target system for accurate and reliable
detection based on HTTP GET flooding.
1.1 Distributed denial of service (DDoS) attacks
DDoS attack is a distributed, large scale coordinated at-
tempt of flooding the network with an enormous amount of
packets which is difficult for victim network to han-dle, and
hence the victim becomes unable to provide the services to
its legitimate user and also the network performance is
greatly deteriorated. This attack exhausts the resources of
the victim network such as bandwidth, memory, computing
power etc. The system which suffers from attacked or whose
services are attacked is called as “primary victim” and on
other hand “secondary victims” is the system that is used to
originate the attack. These secondary victims provide the
attacker, the ability to wage a more powerful DDoS attack as
it is difficult to track down the real attacker. Denial of Service
(DoS) attacks is used to consume all the resources of the
target machine (victim’s services) Distributed denial of
service (DDoS) attack is some sort of malicious activity or a
typical behavior, which cooperate the availability of the
server’s resources and prevents the legitimate users from
using the service. DDOS attacks are not meant to alter data
contents or achieve illegal access, but in that place they
target to crash the servers, generally by temporarily
interrupting or suspending the services of a host connected
to the Internet. DOS attacks can occur from either a single
source or multiple sources. Multiple source DOS attacks are
called distributed denial-of service (DDOS) attacks.
A Denial of Service (DoS) attack is an attempt to make a
computer resource unavailable to normal users. The Dos
attacks are becoming more powerful due to bot behavior.
Attack that leverages multiple sources to create the denial-
of-service condition is known as The Distributed Denial of
Service (DDoS) attack. DDoS attacks are big threats to