Review on Detecting DDoS Attacks using Map Reduce in Haddop
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 2
Abstract
An assault on a network that overflows it with so many requests that regular traffic is either decelerated or entirely interrupted. Unlike a virus or worm, this can cause severe damage to databases. A Distributed Denial of service (DDos) attack can employ hundreds or even thousands of computers that have been previously flooded by HTTP GET packet. The massive amounts of data that collect over time which problematic to analyze using common database management tools. Big data includes activity logs (machine generated data) which consist of unstructured format capture from web. The repository is continuously challenged as Big data increases exponentially where security is one of the challenging and harmful concerns. To handle Big data, Hadoop technology takes cardinal part in analysis. I have proposed detection of DDos attack by using Counter based algorithm and Access Pattern algorithm which will implement using Map Reduce in Hadoop framework. Besides, we are predicting future behavior of attacker by means of analytical & statistical results.
Authors and Affiliations
Mr. Akshay Dattatray Shete, Mr. Sudhanshu S. Gonge
AI-Driven UX/UI Design: Empirical Research and Applications in FinTech
This study explores the transformative impact of AI-driven UX/UI design in the FinTech sector, examining current practices, user preferences, and emerging trends. Through a mixed-methods approach, including surveys, inte...
A Framework for Modeling Non-Functional Requirements for Business-Critical Systems
Proper definition and implementation of NFRs is critical. In case they are Over-specify, then the solution may be too costly to be viable; in case they are underspecified or underachieve them, the system will be inadequa...
Improvement the Soil Subgrade using Sisal Fiber and Bagasse Ash
The effects of addition of Bagasse ash and Sisal Fibers in soil on MDD and OMC relationship different percentages of bagasse ash is added and optimized. Then this optimized bagasse ash soil is the mixed with the differen...
Innovations in Time Related Expression Recognition Using LSTM Networks
The proposed architecture leverages the strengths of both Convolutional Neural Network (CNN) and Bidirectional Long Short-Term (BLSTM) to create a robust model for temporal expression recognition in clinical texts. The C...
A Covert Channel Using Secret Splitting
This paper presents a design of a secure covert channel . The proposed system generates a special covert channel used in sensitive applications. In order to enhance the covert of information, the participants in the comm...