Skip to main content
Erschienen in: Soft Computing 9/2014

01.09.2014 | Focus

A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment

Erschienen in: Soft Computing | Ausgabe 9/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is a more advanced technology for distributed processing, e.g., a thin client and grid computing, which is implemented by means of virtualization technology for servers and storages, and advanced network functionalities. However, this technology has certain disadvantages such as monotonous routing for attacks, easy attack method, and tools. This means that all network resources and operations are blocked all at once in the worst case. Various studies such as pattern analyses and network-based access control for infringement response based on Infrastructure as a Service, Platform as a Service and Software as a Service in cloud computing services have therefore been recently conducted. This study proposes a method of integration between HTTP GET flooding among Distributed Denial-of-Service attacks and MapReduce processing for fast attack detection in a cloud computing environment. In addition, experiments on the processing time were conducted to compare the performance with a pattern detection of the attack features using Snort detection based on HTTP packet patterns and log data from a Web server. The experimental results show that the proposed method is better than Snort detection because the processing time of the former is shorter with increasing congestion.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bakshi A, Yogesh B (2010) Securing cloud from DDoS attacks using intrusion detection system in virtual machine, 2nd International conference on communication software and networks, pp 260–264 Bakshi A, Yogesh B (2010) Securing cloud from DDoS attacks using intrusion detection system in virtual machine, 2nd International conference on communication software and networks, pp 260–264
Zurück zum Zitat Byers S, Robin AD, Kormann D (2004) Defending Against an Internet-Based Attack on the Physical World. ACM Trans Internet Technol 4(3):239–254CrossRef Byers S, Robin AD, Kormann D (2004) Defending Against an Internet-Based Attack on the Physical World. ACM Trans Internet Technol 4(3):239–254CrossRef
Zurück zum Zitat Cheng J, Yin J, Liu Y, Cai Z, Li M (2009) DDoS attack detection algorithm using IP address features. In: Proceedings of Third International Workshop, Hefei, China, pp 207–215 Cheng J, Yin J, Liu Y, Cai Z, Li M (2009) DDoS attack detection algorithm using IP address features. In: Proceedings of Third International Workshop, Hefei, China, pp 207–215
Zurück zum Zitat Choi J, Choi C, Yim K, Kim J, Kim P (2013) Intelligent reconfigurable method of cloud computing resources for multimedia data delivery. Informatica 24(3):381–394 Choi J, Choi C, Yim K, Kim J, Kim P (2013) Intelligent reconfigurable method of cloud computing resources for multimedia data delivery. Informatica 24(3):381–394
Zurück zum Zitat De Santis A, Castiglione A, Fiore U, Palmieri F (2013) An intelligent security architecture for distributed firewalling environments. J Ambient Intell Humaniz Comput 4(2):223–234CrossRef De Santis A, Castiglione A, Fiore U, Palmieri F (2013) An intelligent security architecture for distributed firewalling environments. J Ambient Intell Humaniz Comput 4(2):223–234CrossRef
Zurück zum Zitat Garber L (2000) Denial-of-service attacks rip the Internet. IEEE Comput 33(4):12–17 Garber L (2000) Denial-of-service attacks rip the Internet. IEEE Comput 33(4):12–17
Zurück zum Zitat Huang HD, Lee CS, Wang MH, Kao HY (2014) IT2FS-based ontology with soft-computing mechanism for malware behavior analysis. Soft Comput 18(2):267–284 Huang HD, Lee CS, Wang MH, Kao HY (2014) IT2FS-based ontology with soft-computing mechanism for malware behavior analysis. Soft Comput 18(2):267–284
Zurück zum Zitat Korea Internet and Security Agency (2011) Study on the detection and mitigation algorithm for session consuming DDoS attacks on Web service, KISA-WP-2010-0056 Korea Internet and Security Agency (2011) Study on the detection and mitigation algorithm for session consuming DDoS attacks on Web service, KISA-WP-2010-0056
Zurück zum Zitat Lin CH, Lin HY, Wu TW, Chen YH, Huang CH (2013) Preserving quality of service for normal users against DDoS attacks by using double check priority queues. J Ambient Intell Humaniz Comput 4(2):1–8 Lin CH, Lin HY, Wu TW, Chen YH, Huang CH (2013) Preserving quality of service for normal users against DDoS attacks by using double check priority queues. J Ambient Intell Humaniz Comput 4(2):1–8
Zurück zum Zitat Mishra A, Gupta BB, Joshi RC (2011) A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques, intrusion tolerance and mitigation techniques. In: Proceedings of the 2011 European intelligence and security informatics conference, Athens, Greece, pp 286–289 Mishra A, Gupta BB, Joshi RC (2011) A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques, intrusion tolerance and mitigation techniques. In: Proceedings of the 2011 European intelligence and security informatics conference, Athens, Greece, pp 286–289
Zurück zum Zitat Noh S, Jung G, Choi K, Lee C (2008) Compiling network traffic into rules using soft computing methods for the detection of flooding attacks. Appl Soft Comput 8(3):1200–1210CrossRef Noh S, Jung G, Choi K, Lee C (2008) Compiling network traffic into rules using soft computing methods for the detection of flooding attacks. Appl Soft Comput 8(3):1200–1210CrossRef
Zurück zum Zitat Patrikakis C, Masikos M, Zouraraki O (2004) Distributed denial of service attacks. Int Protocol J 7(4):13–35 Patrikakis C, Masikos M, Zouraraki O (2004) Distributed denial of service attacks. Int Protocol J 7(4):13–35
Zurück zum Zitat Suriadi S, Stebila D, Clark A, Hua Liu (2011) Defending web services against denial of service attacks using client puzzles. In: 2011 IEEE International conference on web services, pp 25–32 Suriadi S, Stebila D, Clark A, Hua Liu (2011) Defending web services against denial of service attacks using client puzzles. In: 2011 IEEE International conference on web services, pp 25–32
Zurück zum Zitat Vladimirova T, Yuhaniz S (2011) An intelligent decision-making system for flood monitoring from space. Soft Comput 15(1):13–24CrossRef Vladimirova T, Yuhaniz S (2011) An intelligent decision-making system for flood monitoring from space. Soft Comput 15(1):13–24CrossRef
Metadaten
Titel
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment
Publikationsdatum
01.09.2014
Erschienen in
Soft Computing / Ausgabe 9/2014
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-014-1250-8

Weitere Artikel der Ausgabe 9/2014

Soft Computing 9/2014 Zur Ausgabe