Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud

被引:0
作者
Lonea, Alina Madalina [1 ]
Popescu, Daniela Elena
Prostean, Octavian [1 ]
Tianfield, Huaglory
机构
[1] Politehn Univ Timisoara, Fac Automat & Comp, Automat & Appl Informat Dept, Timisoara 300223, Romania
来源
SOFT COMPUTING APPLICATIONS | 2013年 / 195卷
关键词
attacks; cloud computing; data fusion; DDoS attacks; Dempster-Shafer Theory (DST); Eucalyptus; Intrusion Detection Systems (IDSs); Fault-Tree Analysis; Snort;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks appear to be main threats for cloud computing. The protection of cloud services against DoS and DDoS attacks is realized using Intrusion Detection Systems (IDSs).This paper aims to evaluate the experimental results of our proposed quantitative solution. The experiments are performed in a private cloud model deployed using Eucalyptus open-source, with virtual machines based IDS (VMs-based IDS) being created in three nodes and the Mysq1 database together with the graphical interfaces for monitoring the alerts being installed and configured in the front-end server. After a set of DDoS attacks are launched against the VMs-based IDS, we analyze all the alerts collected from the VMs-based IDS.
引用
收藏
页码:367 / 379
页数:13
相关论文
共 27 条
[1]  
[Anonymous], CORR
[2]  
[Anonymous], 118 CORN LAW FAC PUB
[3]  
Baker A. R., 2007, SNORT INTRUSION DETE
[4]  
Bakshi Aman, 2010, Proceedings of the Second International Conference on Communication Software and Networks (ICCSN 2010), P260, DOI 10.1109/ICCSN.2010.56
[5]  
Borisaniya B., 2010, 2010 INT C ADV COMM, P209
[6]  
Brennan M., 2002, Using Snort For a Distributed Intrusion Detection System
[7]  
Chi-Chun Lo, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P280, DOI 10.1109/ICPPW.2010.46
[8]  
Criscuolo P. J., 2000, CIAC2319 DEP EN COMP
[9]  
Dhage S.N., 2011, International Conference and Workshop on Emerging Trends in Technology (ICWET 2011) ' TCET, P235
[10]  
DITTRICH D., 1999, The Stacheldraht distributed denial of service attack tool