Abstract

Distributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. It is a very hard task for novice cloud users to identify the real source of DDoS attack because the attacker spoofs the Internet Protocol and Media Access Control addresses. To address this problem, we propose a third party auditor-based packet traceback approach. The method uses Weibull distribution for analyzing the source of the DDoS attack. The approach provides an efficient and fruitful solution because of its strong identification factor. The identification factor depends on the weaknesses left by the intruder. We analyze the traffic pattern to generate attack alert for different cloud users. The advantage of this approach is that it reduces the overhead on the cloud user. With the help of Weibull distribution, we can easily obtain the availability, reliability and median life of DDoS defense in the cloud environment. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are included to show the effectiveness of the proposed method for DDoS attack prevention and mitigation.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.