Skip to main content

Agent-Based Wormhole Attack Detection and Prevention Algorithm in the Cloud Network Using MapReduce Technique

  • Conference paper
  • First Online:
Progress in Advanced Computing and Intelligent Engineering

Abstract

In day-to-day life, various cloud-based services are being used for disparate purposes because of its perpetuity and diverse dexterity. The cloud computing system has some affinity for distributed systems as both use the various features of networking. While using the cloud-based services, a colossal amount of data comes into picture, which upsurges the data traffic in the network. A cloud environment for this huge amount of data, it is challenging to secure it from various kinds of attacks. So an extensible and decisive threat monitoring, detection and prevention system is required for providing a highly securable infrastructure. The research have been done so far focused only monitoring the network for malicious activities, but not detecting and preventing any particular attack. This paper concentrates on a special attack called a wormhole attack on the cloud computing network. The paper proposes a scheme which detects and prevents the wormhole attack using agent nodes in the network. Multiple agent nodes having IDS capability are used to monitor the behavior of other nodes by analyzing the network traffic. Analysis of traffic is done from the following parameters: hop count, time delay, data packet’s path. In cloud network, since the huge amount of traffic is captured by IDS, the work incorporates MapReduce technique to make the approach effectively. The Map procedure concurrently processes the data using the key value pair <k, v>, in our case key values are the parameters used for traffic analysis. The reduce procedure works on the basis of threshold defined for the parameters produces the list of nodes, which are creating wormhole attack in the network. The cornerstone of the proposed approach is, it does not impose any burden on the server, effective for all cloud models. For prevention of the wormhole attack, ID’s of malevolent nodes is broadcasted to other nodes that the given nodes are detected as wormhole nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Ali, M., Khan, S.U., Vasilakos, A.V.: Security issues in cloud computing: opportunities and challenges. Inf. Sci. Elsevier 305, 1 (2015)

    Article  Google Scholar 

  2. Mahajan, V., Sethi, A.: Analysis of intrusion wormhole attack in MANET. In: Military Conference (2008)

    Google Scholar 

  3. Ahuja, R., Banga, A., Ahuja, P.: Performance evaluation and comparison of AODV and DSR routing protocols in MANETs under wormhole attack. In: IEEE Second International Conference on Image Information Processing ICIIP (2013)

    Google Scholar 

  4. Khalil, I., Bagchi, S., Shroff, N.B.: MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. In: Securecomm and Workshop IEEE (2006)

    Google Scholar 

  5. Jigalur, R.S., Bhushan, C.: Designing a secure architecture against wormhole attacks in wireless sensor networks. In: Computing, Communications and Networking Technologies (ICCCNT), IEEE (2013)

    Google Scholar 

  6. Lee, Y., Lee, Y.: Detecting DDoS attacks with Hadoop. In: ACM CoNEXT Student Workshop, Dec 2011

    Google Scholar 

  7. Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., Lu, C.: A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Res. Elsevier (2016)

    Google Scholar 

  8. Verma, P., Dhariwal, S., Tiwari, H.: Wormhole attack intrusion detection and prevention security scheme in MANET. Int. J. Comput. Appl. 105(10), 0975–8887 (2014)

    Google Scholar 

  9. Fontugne, R., Mazel, J., Fukuda, K.: Hashdoop: a MapReduce framework for network anomaly detection. In: IEEE Conference Computer Communications Workshops (INFOCOM Workshop) (2014)

    Google Scholar 

  10. Singh, S., Pandey, B.K., Srivastava, R., Rawat, N., Rawat, P., Awantika: cloud computing attacks: a discussion with solutions. Open J. Mobile Cloud Comput. 1(1) (2014)

    Google Scholar 

  11. Ficco, M., Tasquier, L., Aversa, R.: Agent-based intrusion detection for federated clouds. In: International Conference on Intelligent Networking and Collaborative Systems. IEEE (2014)

    Google Scholar 

  12. Aljarah, I., Ludwig, S.A.: Towards a scalable intrusion detection system based on parallel PSO clustering using MapReduce. In: GECCO Genetic and Evolutionary Computation Conference. ACM (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Verma, P., Tapaswi, S., Wilfred Godfrey, W. (2018). Agent-Based Wormhole Attack Detection and Prevention Algorithm in the Cloud Network Using MapReduce Technique. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S., Mohapatra, D. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 564. Springer, Singapore. https://doi.org/10.1007/978-981-10-6875-1_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6875-1_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6874-4

  • Online ISBN: 978-981-10-6875-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics