Effective Detection of DDOS Based on Big Data- MapReduce
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 10
Abstract
Distributed Denial of Service (DDoS) attacks is large-scale cooperative attacks launched from a large number of compromised hosts called Zombies are a major threat to Internet services. As the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security methodologies do not provide effective defense against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. Therefore, keeping this problem in view author presents various significant areas where data mining techniques seem to be a strong candidate for detecting and preventing DDoS attack. The new proposed methodology can perform detecting and preventing DDoS attack using MapReduce concepts in Big Data.Thus the methodology can implement for both detecting and preventing methodologies.
Authors and Affiliations
Nazneen . , G. Swapna
CFD Simulation of Air Flow in CFBC Boiler under Different Geometry of Nozzle Grid
CFBC technology is more preferable now a day because of its low pollution and flexibility in use of fuel characteristics. The air is a prime requirement for any combustion process to be happen and in case of CFBC air is...
Vulnerability Assessment and Penetration Testing for Url’s Using Different Sql’s Injections Manually
vapt (vulnerability assessment and penetration testing) provides a critical observation of organization operating systems, web servers, database servers, access points and loop holes or back doors. It gives a more detai...
A Survey on Handwritten Devanagari Character Recognition using Neural Network
Handwritten character can be converted in to the digital information using handwritten character Recognition, which is the ability of a computer to receive and interpret handwritten input from documents. Handwritten Dev...
Implementation of Enhancement of Apriori Algorithm
As with the advancement of the IT technologies, the amount of accumulated data is also increasing. It has resulted in large amount of data stored in databases, warehouses and other repositories. Thus the Data mining com...
High Efficient Z-TCAM Implementation Using FPGA for NIDS
A content addressable memory (CAM) is a kind of storage device which is used to access its contents by using its content rather than its address. Since ternary content addressable memory has slow access time, consumes m...