Abstract
Cloud computing is an intelligent integration of distributed computing, hardware virtualization techniques, automated data center techniques and Internet technologies. Due to its appealing features, it has become most prevailing computing platform. Since, a large number of customers are moving towards cloud, attackers are also more interested in attacking cloud services. Distributed Denial of Service (DDoS) attack is one of the most popular methods to disrupt the services of a cloud platform hosting multimedia services. Modern day attackers use botnets to perform variety of DDoS attacks. With the advancement in the technology, bots are now capable to simulate the DDoS attacks as flash crowd events. During a flash crowd event, requests are sent by legitimate users; therefore these requests should not be denied and the server should be able to ensure user’s QoE during a flash crowd event. Based on our study of botnets, flash crowd and DDoS attacks, in this paper, we propose a flow confidence based discrimination algorithm to distinguish between flash crowd event and DDoS attack. Moreover, we have given an effective, efficient and economical approach to ensure user’s QoE during flash crowd events. We have performed various experiments using benchmark datasets to support our theoretical claims which also determine the efficiency and effectiveness of the proposed approach in real world scenario.
Similar content being viewed by others
References
Adhikary T, Das AK et al (2016) Quality of service aware cloud resource provisioning for social multimedia services and applications. Multimed tools Appl 1-25. Springer. doi:10.1007/s11042-016-3852-x
Agrawal PK, Gupta BB, Jain S (2011) SVM based scheme for predicting number of zombies in a DDoS attack. Intelligence and Security Informatics Conference (EISIC), 2011 European. IEEE
Al-Ali Z, Al-Duwairi B, Al-Hammouri AT (2015) Handling system overload resulting from DDoS attacks and flash crowd events. In: IEEE 2nd international conference on Cyber security and cloud computing, New York. Pp 512-512
Alamri A, Hossain MS, Almogren A et al (2016) QoS-adaptive service configuration framework for cloud-assisted video surveillance systems. Multimedia Tools and Applications, Springer 75(21):13333–13348
Arlitt M, Jin T (1998) 1998 world cup web site access logs. August 1998. http://ita.ee.lbl.gov/html/contrib/WorldCup.html. Accessed 23 April 2016
Arlitt M, Jin T (1999) Workload characterization of the 1998 world cup web site. HP Labs Technical Reports
Arun P, Kumar R, Selvakumar S (2013) Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Computer Communications, Elsevier 36(3):303–319
Bailey M, Cooke E, Jahanian F, Xu Y, Karir M (2009) A survey of botnet technology and defenses. Conference for homeland security, CATCH '09. Washington, DC, pp 299-304
Bhushan K, Gupta BB (2017) Security challenges in cloud computing: state-of-art. Int. J. of. Big Data Intelligence, Inderscience 4(2):81–107
Buyya R, Broberg J, Goscinski A (2011) CLOUD COMPUTING: principles and paradigms. John Wiley & Sons, Hoboken
Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82–89
Chen Y, Hwang K (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, Elsevier 66(9):1137–1151
Cho CY, Caballero J, Grier C, Paxson V, Song D (2010) Insights from the inside: a view of botnet management from infiltration. In proceeding of the USENIX LEET
DDoS Trends Report, Verisign. https://www.verisign.com/en_IN/security-services/ddos-protection/ddos-report/index.xhtml. Accessed Jan 2017
de Paula J U, Drummond LMA, de Oliveira D, Frota Y, Barbosa VC (2015) Handling flash-crowd events to improve the performance of web applications. In proceedings of the 30th annual ACM Symposium on applied computing (SAC '15), New York, pp 769-774
Feitosa E, Souto E, Sadok DH (2012) An orchestration approach for unwanted internet traffic identification. Computer Networks, Elsevier 56(12):2805–2831
Gou Z, Yamaguchi S, Gupta BB (2016) Analysis of various security issues and challenges in cloud computing environment: a survey. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI Global, pp 393–419
Gupta BB, Badve OP (2016) Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput Appl 1-28. Springer. doi:10.1007/s00521-016-2317-5
Gupta BB, Joshi RC, Misra M (2009) Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective, Taylor & Francis 18(5):224–247
Holz T, Steiner M, Dahl F, Biersack E, Freiling FC (2008) Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In proceedings of USENIX LEET, pp 1-9
Hoßfeld T et al (2015) Can context monitoring improve QoE? A case study of video flash crowds in the internet of services. In IFIP/IEEE international Symposium on integrated network management (IM). Ottawa, pp 1274-1277
Ianelli N, Hackworth A (2007) Botnets as a vehicle for online crime. International Journal of Forensic Computer Science (IJoFCS) 2(1):19–39
Jia S, Zhang R, Ma Y, Zhong L, Xu C (2016) Modeling and optimization of bandwidth supply performance for cloud-assisted video systems under flash crowd. China Communications 13(9):151–162
Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In Proceedings of the 11th international conference on world wide web (WWW '02). ACM, New York, pp. 293–304
Kandula S, Katabi D, Jacob M, Berger A (2005) Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation. Volume 2 (NSDI'05), USENIX Association, Berkeley, pp 287–300
L Kleinrock (1975) Theory, volume 1. Queueing Systems. Wiley-Interscience publication,New York
Li J, Li YK, Chen X, Lee PPC, Lou W (2015) A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Transactions on Parallel and Distributed Systems 26(5):1206–1216
Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26
Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437
Luo H, Lin Y, Zhang H, Zukerman M (2013) Preventing DDoS attacks by identifier/locator separation. IEEE Netw 27(6):60–65
Maksoudian YL (1969) Probability and statistics with applications. International textbook company, Pennsylvania
Mell P, Grance T (2011) The NIST Definition of cloud computing. National Institute of Standards and Technology, U.S Department of Commerce, Computer security division, Information Technology Laboratory, NIST special publication 800-145
Niu Y, Luo B, Liu F, Liu J, Li B (2015) When hybrid cloud meets flash crowd: towards cost-effective service provisioning. In: IEEE conference on Computer Communications (INFOCOM). Kowloon, pp 1044-1052
Oikonomou G, Mirkovic J (2009) Modeling human behavior for defense against flash-crowd attacks. In proceedings of IEEE international conference on Communications. Dresden, pp 1-6
Peng T, Leckie C, Ramamohanarao K (2007) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv 39(1):1-42
Rahmani H, Sahli N, Kamoun F (2012) DDoS flooding attack detection scheme based on F-divergence. Computer Communications, Elsevier 35(11):1380–1391
Scherrer A, Larrieu N, Owezarski P, Borgnat P, Abry P (2007) Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing 4(1):56–70
Segalin D, Santin AO, Marynowski JE, Segalin L, Maziero C (2015) An approach to deal with processing surges in cloud computing. In: IEEE 39th annual Computer software and applications conference, Taichung, pp 897-905
The CAIDA UCSD "DDoS Attack 2007" Dataset. http://www.caida.org/data/passive/ddos-20070804_dataset.xml. Accessed 23 April 2016
Thing VL, Sloman M, Dulay N (2007) A survey of bots used for distributed denial of service attacks. In proceedings of new approaches for security. Privacy and Trust in Complex Environments. Springer US, pp 229-240
Third Quarter 2016 State Of The Internet / Security Report, Akamai Technologies https://www.akamai.com/us/en/about/news/press/2016-press/akamai-releases-third-quarter-2016-state-of-the-internet-security-report.jsp. Accessed Jan 2017
Wu Y, Wu C, Li B, Qiu X, Lau FCM (2011) CloudMedia: when cloud on demand meets video on demand. In 31st IEEE international conference on distributed computing systems, Minneapolis, pp 268-277
Xiao Z, Chen Q, Luo H (2014) Automatic scaling of internet applications for cloud computing services. IEEE Trans Comput 63(5):1111–1123
Xie Y, Yu SZ (2009) A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Networking 17(1):54–65
Xie Y, Yu SZ (2009) Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans Networking 17(1):15–25
C. S. Yeo et al., Utility computing on global grids, Chapter 143. In Hossein Bidgoli(ed.), The Handbook of Computer Networks. ISBN: 978–0–471-78461–6, JohnWiley & Sons, New York, 2007.
Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Transactions on Parallel and Distributed Systems 23(6):1073–1080
Yu S, Tian Y, Guo S, Wu DO (2014) Can we beat DDoS attacks in clouds? IEEE Transactions on Parallel and Distributed Systems 25(9):2245–2254
Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans Comput 64(1):139–151
Acknowledgements
This research work is being supported by Project grant (SB/FTP/ETA-131/2014) from SERB, DST, Government of India.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bhushan, K., Gupta, B.B. A novel approach to defend multimedia flash crowd in cloud environment. Multimed Tools Appl 77, 4609–4639 (2018). https://doi.org/10.1007/s11042-017-4742-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4742-6