Skip to main content
Log in

A novel approach to defend multimedia flash crowd in cloud environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cloud computing is an intelligent integration of distributed computing, hardware virtualization techniques, automated data center techniques and Internet technologies. Due to its appealing features, it has become most prevailing computing platform. Since, a large number of customers are moving towards cloud, attackers are also more interested in attacking cloud services. Distributed Denial of Service (DDoS) attack is one of the most popular methods to disrupt the services of a cloud platform hosting multimedia services. Modern day attackers use botnets to perform variety of DDoS attacks. With the advancement in the technology, bots are now capable to simulate the DDoS attacks as flash crowd events. During a flash crowd event, requests are sent by legitimate users; therefore these requests should not be denied and the server should be able to ensure user’s QoE during a flash crowd event. Based on our study of botnets, flash crowd and DDoS attacks, in this paper, we propose a flow confidence based discrimination algorithm to distinguish between flash crowd event and DDoS attack. Moreover, we have given an effective, efficient and economical approach to ensure user’s QoE during flash crowd events. We have performed various experiments using benchmark datasets to support our theoretical claims which also determine the efficiency and effectiveness of the proposed approach in real world scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24

Similar content being viewed by others

References

  1. Adhikary T, Das AK et al (2016) Quality of service aware cloud resource provisioning for social multimedia services and applications. Multimed tools Appl 1-25. Springer. doi:10.1007/s11042-016-3852-x

  2. Agrawal PK, Gupta BB, Jain S (2011) SVM based scheme for predicting number of zombies in a DDoS attack. Intelligence and Security Informatics Conference (EISIC), 2011 European. IEEE

  3. Al-Ali Z, Al-Duwairi B, Al-Hammouri AT (2015) Handling system overload resulting from DDoS attacks and flash crowd events. In: IEEE 2nd international conference on Cyber security and cloud computing, New York. Pp 512-512

  4. Alamri A, Hossain MS, Almogren A et al (2016) QoS-adaptive service configuration framework for cloud-assisted video surveillance systems. Multimedia Tools and Applications, Springer 75(21):13333–13348

  5. Arlitt M, Jin T (1998) 1998 world cup web site access logs. August 1998. http://ita.ee.lbl.gov/html/contrib/WorldCup.html. Accessed 23 April 2016

  6. Arlitt M, Jin T (1999) Workload characterization of the 1998 world cup web site. HP Labs Technical Reports

  7. Arun P, Kumar R, Selvakumar S (2013) Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Computer Communications, Elsevier 36(3):303–319

    Article  Google Scholar 

  8. Bailey M, Cooke E, Jahanian F, Xu Y, Karir M (2009) A survey of botnet technology and defenses. Conference for homeland security, CATCH '09. Washington, DC, pp 299-304

  9. Bhushan K, Gupta BB (2017) Security challenges in cloud computing: state-of-art. Int. J. of. Big Data Intelligence, Inderscience 4(2):81–107

  10. Buyya R, Broberg J, Goscinski A (2011) CLOUD COMPUTING: principles and paradigms. John Wiley & Sons, Hoboken

    Book  Google Scholar 

  11. Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82–89

    Article  Google Scholar 

  12. Chen Y, Hwang K (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, Elsevier 66(9):1137–1151

  13. Cho CY, Caballero J, Grier C, Paxson V, Song D (2010) Insights from the inside: a view of botnet management from infiltration. In proceeding of the USENIX LEET

  14. DDoS Trends Report, Verisign. https://www.verisign.com/en_IN/security-services/ddos-protection/ddos-report/index.xhtml. Accessed Jan 2017

  15. de Paula J U, Drummond LMA, de Oliveira D, Frota Y, Barbosa VC (2015) Handling flash-crowd events to improve the performance of web applications. In proceedings of the 30th annual ACM Symposium on applied computing (SAC '15), New York, pp 769-774

  16. Feitosa E, Souto E, Sadok DH (2012) An orchestration approach for unwanted internet traffic identification. Computer Networks, Elsevier 56(12):2805–2831

    Article  Google Scholar 

  17. Gou Z, Yamaguchi S, Gupta BB (2016) Analysis of various security issues and challenges in cloud computing environment: a survey. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI Global, pp 393–419

  18. Gupta BB, Badve OP (2016) Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput Appl 1-28. Springer. doi:10.1007/s00521-016-2317-5

  19. Gupta BB, Joshi RC, Misra M (2009) Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective, Taylor & Francis 18(5):224–247

  20. Holz T, Steiner M, Dahl F, Biersack E, Freiling FC (2008) Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In proceedings of USENIX LEET, pp 1-9

  21. Hoßfeld T et al (2015) Can context monitoring improve QoE? A case study of video flash crowds in the internet of services. In IFIP/IEEE international Symposium on integrated network management (IM). Ottawa, pp 1274-1277

  22. Ianelli N, Hackworth A (2007) Botnets as a vehicle for online crime. International Journal of Forensic Computer Science (IJoFCS) 2(1):19–39

  23. Jia S, Zhang R, Ma Y, Zhong L, Xu C (2016) Modeling and optimization of bandwidth supply performance for cloud-assisted video systems under flash crowd. China Communications 13(9):151–162

    Article  Google Scholar 

  24. Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In Proceedings of the 11th international conference on world wide web (WWW '02). ACM, New York, pp. 293–304

  25. Kandula S, Katabi D, Jacob M, Berger A (2005) Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation. Volume 2 (NSDI'05), USENIX Association, Berkeley, pp 287–300

  26. L Kleinrock (1975) Theory, volume 1. Queueing Systems. Wiley-Interscience publication,New York

  27. Li J, Li YK, Chen X, Lee PPC, Lou W (2015) A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Transactions on Parallel and Distributed Systems 26(5):1206–1216

    Article  Google Scholar 

  28. Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26

    Article  Google Scholar 

  29. Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  MATH  Google Scholar 

  30. Luo H, Lin Y, Zhang H, Zukerman M (2013) Preventing DDoS attacks by identifier/locator separation. IEEE Netw 27(6):60–65

    Article  Google Scholar 

  31. Maksoudian YL (1969) Probability and statistics with applications. International textbook company, Pennsylvania

    Google Scholar 

  32. Mell P, Grance T (2011) The NIST Definition of cloud computing. National Institute of Standards and Technology, U.S Department of Commerce, Computer security division, Information Technology Laboratory, NIST special publication 800-145

  33. Niu Y, Luo B, Liu F, Liu J, Li B (2015) When hybrid cloud meets flash crowd: towards cost-effective service provisioning. In: IEEE conference on Computer Communications (INFOCOM). Kowloon, pp 1044-1052

  34. Oikonomou G, Mirkovic J (2009) Modeling human behavior for defense against flash-crowd attacks. In proceedings of IEEE international conference on Communications. Dresden, pp 1-6

  35. Peng T, Leckie C, Ramamohanarao K (2007) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv 39(1):1-42

  36. Rahmani H, Sahli N, Kamoun F (2012) DDoS flooding attack detection scheme based on F-divergence. Computer Communications, Elsevier 35(11):1380–1391

    Article  Google Scholar 

  37. Scherrer A, Larrieu N, Owezarski P, Borgnat P, Abry P (2007) Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing 4(1):56–70

    Article  Google Scholar 

  38. Segalin D, Santin AO, Marynowski JE, Segalin L, Maziero C (2015) An approach to deal with processing surges in cloud computing. In: IEEE 39th annual Computer software and applications conference, Taichung, pp 897-905

  39. The CAIDA UCSD "DDoS Attack 2007" Dataset. http://www.caida.org/data/passive/ddos-20070804_dataset.xml. Accessed 23 April 2016

  40. Thing VL, Sloman M, Dulay N (2007) A survey of bots used for distributed denial of service attacks. In proceedings of new approaches for security. Privacy and Trust in Complex Environments. Springer US, pp 229-240

  41. Third Quarter 2016 State Of The Internet / Security Report, Akamai Technologies https://www.akamai.com/us/en/about/news/press/2016-press/akamai-releases-third-quarter-2016-state-of-the-internet-security-report.jsp. Accessed Jan 2017

  42. Wu Y, Wu C, Li B, Qiu X, Lau FCM (2011) CloudMedia: when cloud on demand meets video on demand. In 31st IEEE international conference on distributed computing systems, Minneapolis, pp 268-277

  43. Xiao Z, Chen Q, Luo H (2014) Automatic scaling of internet applications for cloud computing services. IEEE Trans Comput 63(5):1111–1123

    Article  MathSciNet  MATH  Google Scholar 

  44. Xie Y, Yu SZ (2009) A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Networking 17(1):54–65

    Article  Google Scholar 

  45. Xie Y, Yu SZ (2009) Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans Networking 17(1):15–25

    Article  Google Scholar 

  46. C. S. Yeo et al., Utility computing on global grids, Chapter 143. In Hossein Bidgoli(ed.), The Handbook of Computer Networks. ISBN: 978–0–471-78461–6, JohnWiley & Sons, New York, 2007.

  47. Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Transactions on Parallel and Distributed Systems 23(6):1073–1080

    Article  Google Scholar 

  48. Yu S, Tian Y, Guo S, Wu DO (2014) Can we beat DDoS attacks in clouds? IEEE Transactions on Parallel and Distributed Systems 25(9):2245–2254

    Article  Google Scholar 

  49. Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans Comput 64(1):139–151

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research work is being supported by Project grant (SB/FTP/ETA-131/2014) from SERB, DST, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. B. Gupta.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhushan, K., Gupta, B.B. A novel approach to defend multimedia flash crowd in cloud environment. Multimed Tools Appl 77, 4609–4639 (2018). https://doi.org/10.1007/s11042-017-4742-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4742-6

Keywords

Navigation