CFP last date
20 December 2024
Reseach Article

Secured Network from Distributed DOS through HADOOP

by R.s.dayama, Aakanksh Bhandare, Bhagayshri Ganji, Vijaya Narayankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 2
Year of Publication: 2015
Authors: R.s.dayama, Aakanksh Bhandare, Bhagayshri Ganji, Vijaya Narayankar
10.5120/20718-3062

R.s.dayama, Aakanksh Bhandare, Bhagayshri Ganji, Vijaya Narayankar . Secured Network from Distributed DOS through HADOOP. International Journal of Computer Applications. 118, 2 ( May 2015), 20-22. DOI=10.5120/20718-3062

@article{ 10.5120/20718-3062,
author = { R.s.dayama, Aakanksh Bhandare, Bhagayshri Ganji, Vijaya Narayankar },
title = { Secured Network from Distributed DOS through HADOOP },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 2 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number2/20718-3062/ },
doi = { 10.5120/20718-3062 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:36.377468+05:30
%A R.s.dayama
%A Aakanksh Bhandare
%A Bhagayshri Ganji
%A Vijaya Narayankar
%T Secured Network from Distributed DOS through HADOOP
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 2
%P 20-22
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The purpose of this paper is to study the characteristics of DDOS attack, various models involved in attacks and to provide alternative. To defences mechanism with their improvements to combat DDOs attack. Recent DDOS attack has demonstrated horrible destructive power by paralyzing web servers within short time. DDOs detection method based on hadoop that implements an Http Get Flooding detection algorithm in mapreduce on the distributed computing platform. An assout on a network that floods it will so many requests that regular traffic is either solved or completely interrupted. Hackers use distributed DDOS attack & leaves hundreds and thousands of bots to overwhelm in terms of bandwidth & reduce the services that are rendering to the user.

References
  1. J. Mirkivic and P. Reiher, A Taxonomy of DDoS Attack and DDoS Defense Mechanisms, ACM SIGCOMM CCR, 2004
  2. H. Sun, Y Zhaung, and H. Chao, A Principal Components Analysis-based Robust DDoS Defence System, IEEE ICC, 2008
  3. H. Liu, Y Sun, and M. Kim, Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch, IEEE ICCCN, August 2011
  4. Y. Lee, W. Kang, and Y. Lee, A Hadoop-based Packet Trace Processing Tool, TMA, April 2011
Index Terms

Computer Science
Information Sciences

Keywords

HADOOP DDOS