2020
DOI: 10.26636/jtit.2020.146120
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark

Abstract: Security is a critical concern for cloud service providers. Distributed denial of service (DDoS) attacks are the most frequent of all cloud security threats, and the consequences of damage caused by DDoS are very serious. Thus, the design of an efficient DDoS detection system plays an important role in monitoring suspicious activity in the cloud. Real-time detection mechanisms operating in cloud environments and relying on machine learning algorithms and distributed processing are an important research issue. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“… Attack traffic: Hadoop cluster:01+02 (IP and port)” 20-40 nodes (Namenode+Datanodes) Patil et al [ 41 ] “Source and dest. CAIDA07, MIT-DDoS98 Hadoop cluster: 01+03 (IP and port)” (Namenode+Datanodes) Gumaste et al [ 42 ] “Source and dest. Captured flows Open-stack based testbed IP”, “Protocol” 01+01+03 (Controller+ neutron+compute nodes) Patil et al [ 43 ] “Source IP”, “Timestamp”, Synthetic data 02 nodes Hadoop cluster “Destination IP” 03 nodes Spark Streaming cluster Ahmed et al [ 44 ] “Source and dest.…”
Section: Related Workmentioning
confidence: 99%
“… Attack traffic: Hadoop cluster:01+02 (IP and port)” 20-40 nodes (Namenode+Datanodes) Patil et al [ 41 ] “Source and dest. CAIDA07, MIT-DDoS98 Hadoop cluster: 01+03 (IP and port)” (Namenode+Datanodes) Gumaste et al [ 42 ] “Source and dest. Captured flows Open-stack based testbed IP”, “Protocol” 01+01+03 (Controller+ neutron+compute nodes) Patil et al [ 43 ] “Source IP”, “Timestamp”, Synthetic data 02 nodes Hadoop cluster “Destination IP” 03 nodes Spark Streaming cluster Ahmed et al [ 44 ] “Source and dest.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, a laboratory-based testbed with a Floodlight controller was deployed to generate a dataset for testing the model and achieved an accuracy of 98.88%. The authors in [22] explored the RF, decision tree, and logistic regression methods to detect DDoS in two datasets: KDD Cup 99 dataset and their own generated real-time dataset. The RF technique provided the best performance with an accuracy of 99.21% and a FPR of 0.3%.…”
Section: A Existing Workmentioning
confidence: 99%
“…However, it would be more appropriate to use a real traffic dataset rather than a synthetic dataset. Gumaste et al [130] proposed a detection approach on the OpenStack platform within the private cloud environment. The authors designed Spark as a service for ondemand provisioning of clusters.…”
Section: A Ddos Defense Systems Based On ML Techniques In Cloud Compmentioning
confidence: 99%
“…Spark provides a small processing delay in contrast to Hadoop, and it is faster than Hadoop MapReduce [160]. Several related works employed the Spark framework to mitigate DDoS attacks [130], [160]- [164]; however, Spark does not support file management systems, which raises the need to integrate with other platforms. Another challenge is that memory becomes a bottleneck when dealing with a large amount of data.…”
Section: H Distributed Processing Of Ddos Attacks Using Hadoop and Smentioning
confidence: 99%