Skip to main content

Cooperative Mitigation of DDoS Attacks Using an Optimized Auction Scheme on Cache Servers

  • Conference paper
  • First Online:
Advanced Informatics for Computing Research (ICAICR 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 956))

  • 1214 Accesses

Abstract

Distributed Denial of Service (DDoS) attack is one of the most prevalent attacks on the internet today which attacks the availability of the server by resource and bandwidth depletion exhaustion. Many mechanisms exist to fight against DDoS attack, a set of which are the cooperative defense mechanisms which work in a distributed manner and are more robust. This work makes use of one of the latest meta-heuristic optimization techniques, Whale Optimization Algorithm (WOA) to find underutilized internet cache servers which are in best position to absorb DDoS flood. These multiple caches will absorb a part of the attack flood thus preventing the victim’s network from getting congested. For effective allocation of these cache resources a Continuous Double Auction (CDA) mechanism is applied. It is more flexible and efficient as it allows simultaneous bidding by sellers and buyers. The cache servers are selected through multi-objective WOA in MATLAB and then the auction platform is set-up using Actor Model. In cooperative defense, selection of a pricing strategy which maximizes collateral profit is very important so a round-wise bidding strategy is implemented which promotes long-term participation. For evaluation of the scheme, the workload traces of distributed servers are used to generate three scenarios under different attack load conditions. Depending on the supply-demand of free cache resources, the results show that the proposed algorithm has high detection rate of close optimum solutions. This leads to increased throughput because the attack traffic is not only shared, but is shared in a balanced way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gupta, B.B., Joshi, R.C., Misra, M.: Defending against distributed denial of service attacks: issues and challenges. Inf. Secur. J.: Glob. Perspect. 18(5), 224–247 (2009)

    Google Scholar 

  2. https://www.calyptix.com/top-threats/ddos-attacks-101-types-targets-motivations/. Access on 21 Mar 2018

  3. Fujiwara, I.: Study on combinatorial auction mechanism for resource allocation in cloud computing environment (2012)

    Google Scholar 

  4. Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H., Pras, A.: Collaborative DDoS defense using flow-based security event information. In: 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 516–522. IEEE, April 2016

    Google Scholar 

  5. Rashidi, B., Fung, C., Bertino, E.: A collaborative DDoS defense framework using network function virtualization. IEEE Trans. Inf. Forensics Secur. 12(10), 2483–2497 (2017)

    Article  Google Scholar 

  6. Devi, S.R., Yogesh, P.: A hybrid approach to counter application layer DDoS attacks. Int. J. Cryptogr. Inf. Secur. (IJCIS) 2(2), 45 (2012)

    Google Scholar 

  7. Rodrigues, B., Bocek, T., Stiller, B.: Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). Semantic Scholar (2017)

    Google Scholar 

  8. Kalkan, K., Alagöz, F.: A distributed filtering mechanism against DDoS attacks: scoreForCore. Comput. Netw. 108, 199–209 (2016)

    Article  Google Scholar 

  9. Shuai, C., Jiang, J., Ouyang, X.: A lightweight cooperative detection framework odfDDoS/DoS attacks based on counting bloom filter. J. Theor. Appl. Inf. Technol. 45(1), 160–167 (2012)

    Google Scholar 

  10. Fortier, D., Spradlin, J.C., Sigroha, P., Fulton, A.: U.S. Patent No. 8,909,751. U.S. Patent and Trademark Office, Washington, D.C. (2014)

    Google Scholar 

  11. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)

    Article  Google Scholar 

  12. Jang, M.W.: The actor architecture manual. Department of Computer Science, University of Illinois at Urbana-Champaign (2004)

    Google Scholar 

  13. Iosup, A., et al.: The grid workloads archive. FGCS 24(7), 672–686 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. B. Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gulihar, P., Gupta, B.B. (2019). Cooperative Mitigation of DDoS Attacks Using an Optimized Auction Scheme on Cache Servers. In: Luhach, A., Singh, D., Hsiung, PA., Hawari, K., Lingras, P., Singh, P. (eds) Advanced Informatics for Computing Research. ICAICR 2018. Communications in Computer and Information Science, vol 956. Springer, Singapore. https://doi.org/10.1007/978-981-13-3143-5_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3143-5_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3142-8

  • Online ISBN: 978-981-13-3143-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics