Evaluation of experiments on detecting distributed denial of service (DDoS) attacks in eucalyptus private cloud

Alina Mǎdǎlina Lonea*, Daniela Elena Popescu, Octavian Prostean, Huaglory Tianfield

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)


Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks appear to be main threats for cloud computing. The protection of cloud services against DoS and DDoS attacks is realized using Intrusion Detection Systems (IDSs). This paper aims to evaluate the experimental results of our proposed quantitative solution. The experiments are performed in a private cloud model deployed using Eucalyptus open-source, with virtual machines based IDS (VMs-based IDS) being created in three nodes and the Mysql database together with the graphical interfaces for monitoring the alerts being installed and configured in the front-end server. After a set of DDoS attacks are launched against the VMs-based IDS, we analyze all the alerts collected from the VMs-based IDS.

Original languageEnglish
Title of host publicationSoft Computing Applications: Proceedings of the 5th International Workshop Soft Computing Applications (SOFA)
Number of pages13
ISBN (Electronic)9783642339417
ISBN (Print)9783642339400
Publication statusPublished - 31 Oct 2012
Event5th International Workshop on Soft Computing Applications - Szeged, Hungary
Duration: 22 Aug 201224 Aug 2012
Conference number: 5

Publication series

NameAdvances in Intelligent Systems and Computing
Volume195 AISC
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365


Conference5th International Workshop on Soft Computing Applications
Abbreviated titleSOFA 2012


  • attacks
  • cloud computing
  • data fusion
  • DDoS attacks
  • Dempster-Shafer Theory (DST)
  • Eucalyptus
  • Fault-Tree Analysis
  • Intrusion Detection Systems (IDSs)
  • Snort

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)


Dive into the research topics of 'Evaluation of experiments on detecting distributed denial of service (DDoS) attacks in eucalyptus private cloud'. Together they form a unique fingerprint.

Cite this