A factorial space for a system-based detection of botcloud activity

Badis Hammi, Rida Khatoun, Guillaume Doyen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Today, beyond a legitimate usage, the numerous advantages of cloud computing are exploited by attackers, and Botnets supporting DDoS attacks are among the greatest beneficiaries of this malicious use. Such a phenomena is a major issue since it strongly increases the power of distributed massive attacks while involving the responsibility of cloud service providers that do not own appropriate solutions. In this paper, we present an original approach that enables a source-based de- tection of UDP-flood DDoS attacks based on a distributed system behavior analysis. Based on a principal component analysis, our contribution consists in: (1) defining the involvement of system metrics in a botcoud's behavior, (2) showing the invariability of the factorial space that defines a botcloud activity and (3) among several legitimate activities, using this factorial space to enable a botcloud detection.

Original languageEnglish
Title of host publication2014 6th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2014 Conference and Workshops
PublisherIEEE Computer Society
ISBN (Print)9781479932238
DOIs
Publication statusPublished - 1 Jan 2014
Externally publishedYes
Event2014 6th International Conference on New Technologies, Mobility and Security, NTMS 2014 - Dubai, United Arab Emirates
Duration: 30 Mar 20142 Apr 2014

Publication series

Name2014 6th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2014 Conference and Workshops

Conference

Conference2014 6th International Conference on New Technologies, Mobility and Security, NTMS 2014
Country/TerritoryUnited Arab Emirates
CityDubai
Period30/03/142/04/14

Fingerprint

Dive into the research topics of 'A factorial space for a system-based detection of botcloud activity'. Together they form a unique fingerprint.

Cite this