Evaluation of experiments on detecting distributed denial of service (DDoS) attacks in eucalyptus private cloud

Alina Mǎdǎlina Lonea*, Daniela Elena Popescu, Octavian Prostean, Huaglory Tianfield

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)

    Abstract

    Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks appear to be main threats for cloud computing. The protection of cloud services against DoS and DDoS attacks is realized using Intrusion Detection Systems (IDSs). This paper aims to evaluate the experimental results of our proposed quantitative solution. The experiments are performed in a private cloud model deployed using Eucalyptus open-source, with virtual machines based IDS (VMs-based IDS) being created in three nodes and the Mysql database together with the graphical interfaces for monitoring the alerts being installed and configured in the front-end server. After a set of DDoS attacks are launched against the VMs-based IDS, we analyze all the alerts collected from the VMs-based IDS.

    Original languageEnglish
    Title of host publicationSoft Computing Applications: Proceedings of the 5th International Workshop Soft Computing Applications (SOFA)
    PublisherSpringer-Verlag
    Pages367-379
    Number of pages13
    ISBN (Electronic)9783642339417
    ISBN (Print)9783642339400
    DOIs
    Publication statusPublished - 31 Oct 2012
    Event5th International Workshop on Soft Computing Applications - Szeged, Hungary
    Duration: 22 Aug 201224 Aug 2012
    Conference number: 5

    Publication series

    NameAdvances in Intelligent Systems and Computing
    Volume195 AISC
    ISSN (Print)2194-5357
    ISSN (Electronic)2194-5365

    Conference

    Conference5th International Workshop on Soft Computing Applications
    Abbreviated titleSOFA 2012
    Country/TerritoryHungary
    CitySzeged
    Period22/08/1224/08/12

    Keywords

    • attacks
    • cloud computing
    • data fusion
    • DDoS attacks
    • Dempster-Shafer Theory (DST)
    • Eucalyptus
    • Fault-Tree Analysis
    • Intrusion Detection Systems (IDSs)
    • Snort

    ASJC Scopus subject areas

    • Control and Systems Engineering
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Evaluation of experiments on detecting distributed denial of service (DDoS) attacks in eucalyptus private cloud'. Together they form a unique fingerprint.

    Cite this