Abstract
Distributed Denial of Service (DDoS) attack is one of the most prevalent attacks on the internet today which attacks the availability of the server by resource and bandwidth depletion exhaustion. Many mechanisms exist to fight against DDoS attack, a set of which are the cooperative defense mechanisms which work in a distributed manner and are more robust. This work makes use of one of the latest meta-heuristic optimization techniques, Whale Optimization Algorithm (WOA) to find underutilized internet cache servers which are in best position to absorb DDoS flood. These multiple caches will absorb a part of the attack flood thus preventing the victim’s network from getting congested. For effective allocation of these cache resources a Continuous Double Auction (CDA) mechanism is applied. It is more flexible and efficient as it allows simultaneous bidding by sellers and buyers. The cache servers are selected through multi-objective WOA in MATLAB and then the auction platform is set-up using Actor Model. In cooperative defense, selection of a pricing strategy which maximizes collateral profit is very important so a round-wise bidding strategy is implemented which promotes long-term participation. For evaluation of the scheme, the workload traces of distributed servers are used to generate three scenarios under different attack load conditions. Depending on the supply-demand of free cache resources, the results show that the proposed algorithm has high detection rate of close optimum solutions. This leads to increased throughput because the attack traffic is not only shared, but is shared in a balanced way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gupta, B.B., Joshi, R.C., Misra, M.: Defending against distributed denial of service attacks: issues and challenges. Inf. Secur. J.: Glob. Perspect. 18(5), 224–247 (2009)
https://www.calyptix.com/top-threats/ddos-attacks-101-types-targets-motivations/. Access on 21 Mar 2018
Fujiwara, I.: Study on combinatorial auction mechanism for resource allocation in cloud computing environment (2012)
Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H., Pras, A.: Collaborative DDoS defense using flow-based security event information. In: 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 516–522. IEEE, April 2016
Rashidi, B., Fung, C., Bertino, E.: A collaborative DDoS defense framework using network function virtualization. IEEE Trans. Inf. Forensics Secur. 12(10), 2483–2497 (2017)
Devi, S.R., Yogesh, P.: A hybrid approach to counter application layer DDoS attacks. Int. J. Cryptogr. Inf. Secur. (IJCIS) 2(2), 45 (2012)
Rodrigues, B., Bocek, T., Stiller, B.: Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). Semantic Scholar (2017)
Kalkan, K., Alagöz, F.: A distributed filtering mechanism against DDoS attacks: scoreForCore. Comput. Netw. 108, 199–209 (2016)
Shuai, C., Jiang, J., Ouyang, X.: A lightweight cooperative detection framework odfDDoS/DoS attacks based on counting bloom filter. J. Theor. Appl. Inf. Technol. 45(1), 160–167 (2012)
Fortier, D., Spradlin, J.C., Sigroha, P., Fulton, A.: U.S. Patent No. 8,909,751. U.S. Patent and Trademark Office, Washington, D.C. (2014)
Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)
Jang, M.W.: The actor architecture manual. Department of Computer Science, University of Illinois at Urbana-Champaign (2004)
Iosup, A., et al.: The grid workloads archive. FGCS 24(7), 672–686 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gulihar, P., Gupta, B.B. (2019). Cooperative Mitigation of DDoS Attacks Using an Optimized Auction Scheme on Cache Servers. In: Luhach, A., Singh, D., Hsiung, PA., Hawari, K., Lingras, P., Singh, P. (eds) Advanced Informatics for Computing Research. ICAICR 2018. Communications in Computer and Information Science, vol 956. Springer, Singapore. https://doi.org/10.1007/978-981-13-3143-5_33
Download citation
DOI: https://doi.org/10.1007/978-981-13-3143-5_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3142-8
Online ISBN: 978-981-13-3143-5
eBook Packages: Computer ScienceComputer Science (R0)