Detection of DDoS Attack in Semantic Web
Prashant Chauhan, Abdul Jhummarwala and Manoj Pandya. Article: Detection of DDoS Attack in Semantic Web. International Journal of Applied Information Systems 4(6):7-10, December 2012. BibTeX
@article{key:article, author = "Prashant Chauhan and Abdul Jhummarwala and Manoj Pandya", title = "Article: Detection of DDoS Attack in Semantic Web", journal = "International Journal of Applied Information Systems", year = 2012, volume = 4, number = 6, pages = "7-10", month = "December", note = "Published by Foundation of Computer Science, New York, USA" }
Abstract
We are currently living in an era where information is very crucial and critical measure of success. Various forms of computing are also available and now a days it is an era of distributed computing where all the task and information are shared among participated nodes. This type of computing can have homogeneous or heterogeneous platform and hardware. The concept of cloud computing and virtualization has gained much momentum and has become a more popular phrase in information technology. Many organizations have started implementing these new technologies to further reduce costs through improved machine utilization, reduced administration time and infrastructure costs. Cloud computing also faces challenges. One of such problem is DDoS attack so in this paper we will focus on DDoS attack and how to overcome from it using honeypot. For this here open source tools and software are used. Typical DDoS solution mechanism is single host oriented and in this paper focused on distributed host oriented solution that meets scalability.
Reference
- NathalieWeiler, Eleventh IEEE International Workshops on Enabling Technologies,2002, "Honeypots for Distributed Denial of Service Attacks"
- Yuqing Mai, Radhika Upadrashta and Xiao Su, ITCC'04 "J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion Detection"
- Yeonhee Lee, Wonchul Kang, and Youngseok Lee, 51-63, TMA'11"A Hadoop-based Packet Trace Processing Tool"
- Yun Yang, Hongli Yang and JiaMi, IEEE, 2011, "Design of Distributed Honeypot System Based on Intrusion Tracking"
- Anup Suresh Talwalkar, 2011, "HadoopT - Breaking the Scalability Limits of Hadoop"
- Flavien Flandrin, 2010, "A Methodology To Evaluate Rate-Based Intrusion Prevention System Against Distributed Denial Of Service"
Keywords
Cloud Security, Network Monitoring, Distributed Log Processing