You are on page 1of 4

Securing Cloud Server Data Network From Evolving

DDoS Attack
Prof. Minal P.Nerkar, Mayur Hiwarkar, Kunal Parkar, Rutuja Butle, Sukirti Singh
nerkar.minal@gmail.com, hiwarkarmayur9@gmail.com, kunal.parkar886@gmail.com, butlerutuja@gmail.com,
sukirtisingh18@gmail.com
Computer Department AISSMS IOIT,
Pune.

ABSTRACT  Unusually slow network performance (opening


In this paper we have implemented an idea which will detect a files or accessing web sites)
real-time DoS attack from a number of machines on the live  Unavailability of a particular web site
cloud and will allow the genuine users to access the service
without any delay and block the bad user and prevent the  Inability to access any web site
DDoS attack. The TCP connections between a client and a 2. PREVIOUS WORKS
target web server are exploited by Flooding which typically is Earlier, there were few methods to detect and mitigate
one of the DDoS attack. Our main aim is to devise a DDoS the DoS attacks. But in today’s era, attacks were much
anomaly detection method on cloud which implements a data more brute which involved 1000’s of systems being
mining detection algorithm against these types of Flooding
attacked at once and tracking them were a more tedious
attacks.
task. Some of the methods to detect and mitigate DoS
General Terms attacks were even useful as they could detect the attacks
DDoS attack recognition. even before it happened. But those methods cannot be
applied for DDoS as it much more large in scale. The
Keywords recent attack of Ransomware virus took place which
DDoS, Data Mining, Cloud Computing, Network Bandwidth, blocked the access of millions of users around the
Bot Net, HTTP Gate Attack, Flooding Attack, Cloud. globe. The attack was neutralized after a patch was
released to mitigate it.
1. INTRODUCTION
In our project we aim to secure the cloud from evolving 3. Proposed System
DDoS attacks using Data Mining techniques. The
algorithm used for this is kNN(k-Nearest Neighbor) 3.1 System Architecture
algorithm. We aim to mitigate the attack at run-time We propose A description of the program architecture is
thus blocking the malicious user from accessing the presented. The block below represents a Cloud and the
services of the cloud. The attack under consideration is entities inside the block are the components of the
HTTP GET attack. Whenever the malicious user attacks cloud. The different data nodes in the figure indicate
the cloud, our system will detect the attack pattern from various servers on the cloud. For ex. : MySql port,
a host of parameters viz. Timestamp , Port number. and MongoDB port which can be targeted by the attackers.
then block the user and update the IP of the attacker to a kNN algorithm provides simplicity, effectiveness and
table and if the service request is made from that intuitiveness in the further determining the result. Also
particular IP again, then our system will deny that it is robust to noisy training data and is effective when
request thus clearing the path for the good user for the the training dataset is high which shadows the
uninterrupted service. Criminal perpetrators of DoS and disadvantages of Naïve Bays algorithm .Our project
DDoS attacks often target sites or services hosted on contains a set of dataset which are interdependent on
high-profile web servers such as banks, credit card the each other and Naive Bays works on the data which
payment gateways. Motives of revenge, blackmail or is dependent. So Naïve Bays is not suitable for our
activism can be behind other attacks. project. Hence we will be using the kNN algorithm
The United States Computer Emergency Readiness which is very robust and provides the output very
Team (US-CERT) defines symptoms of denial-of- quickly.
service attacks to include

Volume 3 Issue 2 April - 2018 117


3.4 Blocking Unblocking
The main blocking and unblocking takes place here. The IP’s
that are been segregated or rather the malicious IP’s are
removed and are updated in the IP table. After which the IP
are clean are allowed the access to the service .

Fig 1.Basic steps


3.2 Process
It consists tcpdump prints the contents of network packets. It
can read packets from a network interface card or from a
previously created saved packet file. tcpdump can write
packets to standard output or a file.
It is also possible to use tcpdump for the specific purpose of
intercepting and displaying the communications of another
user or computer. A user with the necessary privileges on a
system acting as a router or gateway through which
unencrypted traffic such as Telnet or HTTP passes can use
tcpdump to view login IDs, passwords, the URLs and content
of websites being viewed, or any other unencrypted
information.
The user may optionally apply a BPF-based filter to limit the
number of packets seen by tcpdump; this renders the output
more usable on networks with a high volume of traffic.

3.3 Classification

This is the Classification Phase where the IP’s are


classified according to the timestamp suggested.

Volume 3 Issue 2 April - 2018 118


3.5 Analysis

4. Test Cases

5.Architecture Diagram
This figure shows the rough idea of how our proposed system
works. Our system will continuously monitor the IP's which
are requesting for a service. Based on the threshold value the
IP's will be segregated into 2 parts. The IP count which is less
than the threshold will be treated as genuine while the IP
count which is greater than the threshold will be updated in
the IP table and blocked on run time.

Volume 3 Issue 2 April - 2018 119


6. ACKNOWLEDGMENTS Intelligent Systems and Control(ISCO), pp. 01-06, 2016,
2016
We would like to express gratitude to our project guide Prof.
Minal P. Nerkar for her expert advice and encouragement [10] Yeonhee Lee, Young seok Lee, “Detecting DDoS
throughout this difficult project ,as well as project coordinator Attacks with Hadoop”, ACM CoNEXT Student
Dr.K.S. Wagh and Head of Department Prof. S.N. Zaware. Workshop Japan, 2011
Without their continuous support and encouragement this
project might not have been possible. Scene", 2015 15th International Conference on
Intelligent Sysems Design and Applications (ISDA) .

7. REFERENCES
[1] Preeti Daffu, Amanpreet Kaur, "Mitigation of DDoS
attacks in Cloud Computing," 5th International
Conference on Wireless Networks and Embedded
Systems (WECON), pp. 01-05, 2016.

[2] Jeanette Smith-Perrone, Jeremy Sims, "Securing Cloud


,SDN and a Large Data Networks Environments from
Emerging DoS Attacks," 2017 7th International
Conference on Cloud Computing, Data Science &
Engineering - Confluence, pp. 466-469, 2017.

[3] Jin Tang, Yong Hao, Wei Song, "SIP Flooding Attack
Detection with a Multi-Dimensional Sketch Design,"
IEEE Transactions on Dependable and Secure
Computing, Vol.11, Issue 6, pp. 582-595, 2013.

[4] Anand Keshri, Mayank Agarwal, Sunit Kumar Nandi,


"DoS attacks Prevention using IDS and Data Mining,"
2016 International Conference on Accessibility to Digital
World (ICADW), pp. 87-92, 2016.

[5] Johan Sharif, Mudrik Alaydrus, " Building a private


Cloud Computing and the analysis against DoS (Denial
of service) attacks," 4th International Conference on
Cyber and IT Service Management, pp. 01-06, 2016.

[6] Shiu Yu , Yonghhong Tian, Song Guo, "Can We Beat


DDoS Attacks in Cloud?," IEEE Transactions on Parallel
and Distributed Systems, Vol. 25, Issue 9, pp. 2245-
2254, 2014.

[7] Mais Nijim, Mohannad Khan, " FastDetict: A Data


Mining Engine for predecting and preventing DDos
Attacks," 2017 IEEE International Symposium on
Technologies for Homeland Security (HST), pp. 01-05,
2017

[8] Nikhil Tripathi , Neminath Hubbali, “How Secure are


web Servers?An Empirical Study of slow HTTP DoS
Attacks And Detection”, 11th International Conference
on Availability, Reliability and Security (ARES), pp.
454-463, 2016

[9] K.Muthupriya, Dr.S.Mercy Shalinie, Mr.K.Narasimha


Mallikarjunan, “A servey of Distributed Denial of
Service attack”, 10th International Conference on

Volume 3 Issue 2 April - 2018 120

You might also like