Anomaly Detection in Distributed Denial of Service Attack using Map Reduce Improvised counter-based algorithm in Hadoop
-
2018-12-09 https://doi.org/10.14419/ijet.v7i4.36.23811 -
Anomaly detection, Denial of service, Hadoop, Map Reduce. -
Abstract
A Distributed Denial of Service (DDOS) is one of the major threats in the cyber network and it causes the computers flooded with the Users Datagram Packet (UDP).This type of attack crashes the victim with large volume of traffic and the victim is not capable of performing normal communication and crashes it completely. To handle this DDOS attack the normal Intrusion Detection System is not suitable to hold and find the amount of the data in the network. Hadoop is a frame work that allows huge amount of data and it is used to processes the huge amount of data. A Map reduce program comprises of a Map task that performs filtering and sorting and a Reduce task that performs summary operation. The propose work focuses on the detection algorithm based on Map Reduce platform which uses the Improvised counter based (MRICB) algorithm to detect the DDOS flooding attacks. The MRICB algorithm is implemented with Map Reduce functionalities at the stage of verifying the Network IPS. This proposed algorithm also focuses on the UDP flooding attack using anomaly based intrusion detection technique that identifies the kind of packets and the flow of packet in the node is more that the set threshold and also identifies the source code causing UDP Flood attack . Thus it ensures the normal communication with large volume of traffic.Â
Â
 -
References
[1] Chaitanya Buragohain, M. J. (Nov 2015). Anomaly based DDoS Attack Detection . International journal of computer Applications , 0975-8887.
[2] Hadoop. (2011, june). Retrieved from www.wiki/apache.org/hadoop.
[3] Hadoop Distributed File System. (2013, june). Retrieved from httP://hadoop.apache.org.
[4] Riaz Ahamed, H. G. (Dec 2017). Studey on Analysis of Hadoop Based Metwork Intrusion Detection System. International Journal of Engineering Science Invention , 01-04.
[5] S.Navale. (2012). Detecting And Analyzing Ddos Attack Using Map Reduce In Hadoop ., (pp. 1,2,3,4).
[6] Shewetha tripathi, B. A. (2013). "Hadoop Baed defence solution to handle distributed network system. journal of information Security , 4,150-164.
[7] Shweta Tripathi1, B. G. (2013). Hadoop Based Defense Solution to Handle Distributed. Journal of Information Security, 2013, 4, 150-164 , 4,150-164.
[8] Hadoop Wiki", June 2011, [online] Available: wiki.apache.org/hadoop.
[9]
[10] Hadoop Distributed File System. http://hadoop.apache.org/ common/docs/current/hdfs design.html.
-
Downloads
-
How to Cite
S.Kalai vani, Y., & P.Ranjana, D. (2018). Anomaly Detection in Distributed Denial of Service Attack using Map Reduce Improvised counter-based algorithm in Hadoop. International Journal of Engineering & Technology, 7(4.36), 390-393. https://doi.org/10.14419/ijet.v7i4.36.23811Received date: 2018-12-12
Accepted date: 2018-12-12
Published date: 2018-12-09