Review on Detecting DDoS Attacks using Map Reduce in Haddop

Abstract

An assault on a network that overflows it with so many requests that regular traffic is either decelerated or entirely interrupted. Unlike a virus or worm, this can cause severe damage to databases. A Distributed Denial of service (DDos) attack can employ hundreds or even thousands of computers that have been previously flooded by HTTP GET packet. The massive amounts of data that collect over time which problematic to analyze using common database management tools. Big data includes activity logs (machine generated data) which consist of unstructured format capture from web. The repository is continuously challenged as Big data increases exponentially where security is one of the challenging and harmful concerns. To handle Big data, Hadoop technology takes cardinal part in analysis. I have proposed detection of DDos attack by using Counter based algorithm and Access Pattern algorithm which will implement using Map Reduce in Hadoop framework. Besides, we are predicting future behavior of attacker by means of analytical & statistical results.

Authors and Affiliations

Mr. Akshay Dattatray Shete, Mr. Sudhanshu S. Gonge

Keywords

Related Articles

Innovative Empirical Approach for Intrusion Detection Using ANN

Intrusion detection system based on Artificial Neural Network (ANN) is a very active field that detects normal or attack connection on the network and can improve the performance of Intrusion detection system (IDS), the...

Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network

Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a...

The Study of the Various VLSI Design Method

VLSI outlooks for the Very Large Scale Integrated, and this is a very advanced electronic technology. VLSI circuits have been used in a variety of applications, including microcontrollers, microcomputers, n chips, chips...

Effect of Different Coloured Glass Powder, Limestone Waste Powder as Partial Sand Replacement and Flyash as Partial Cement Replacement in M30 Concrete

Limestone waste is a byproduct of the aggregate production process in the rubble crusher Limestone unit, which involves the crushing of rocks. The use of limestone waste as a sand substitute in construction materials wou...

Optimal Energy-Efficient Predictive Controllers for Automotive Air Conditioning Systems

This work provides robust model predictive controllers for a vehicle climate control (A/C-R) system featuring a three-speed, constantly variable compressor that improves temperate stability while lowering energy consumpt...

Download PDF file
  • EP ID EP749433
  • DOI -
  • Views 13
  • Downloads 0

How To Cite

Mr. Akshay Dattatray Shete, Mr. Sudhanshu S. Gonge (2014). Review on Detecting DDoS Attacks using Map Reduce in Haddop. International Journal of Innovative Research in Computer Science and Technology, 2(2), -. https://europub.co.uk/articles/-A-749433