TY - GEN
T1 - Clustering methods comparison
T2 - 2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2016
AU - Hammi, Badis
AU - Rahal, Mohamed Cherif
AU - Khatoun, Rida
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/9/19
Y1 - 2016/9/19
N2 - Recently, cloud computing has conquered IT markets and majority of institutions use its services at different scales. As any IT technology, cloud computing suffers from security issues and numerous studies were - and in progress - given in order to overcome them. However, most of the latter focus on data, users and infrastructure security from external attacks, and very few ones focus on the issue of using the cloud's infrastructure as an attack tool or support. To address the issue of botnets hosted in the cloud, we realized an experimental campaign where we implemented a botnet on a virtualized infrastructure and realized numerous attacks. The collected data was exploited in order to study and compare the effectiveness of clustering methods in the detection of DDoS attacks generated by botnets in the cloud.
AB - Recently, cloud computing has conquered IT markets and majority of institutions use its services at different scales. As any IT technology, cloud computing suffers from security issues and numerous studies were - and in progress - given in order to overcome them. However, most of the latter focus on data, users and infrastructure security from external attacks, and very few ones focus on the issue of using the cloud's infrastructure as an attack tool or support. To address the issue of botnets hosted in the cloud, we realized an experimental campaign where we implemented a botnet on a virtualized infrastructure and realized numerous attacks. The collected data was exploited in order to study and compare the effectiveness of clustering methods in the detection of DDoS attacks generated by botnets in the cloud.
KW - Botcloud
KW - DDoS
KW - botnet
KW - cloud security
KW - clustering
KW - egress detection
KW - source based detection
UR - https://www.scopus.com/pages/publications/84992026501
U2 - 10.1109/SSIC.2016.7571810
DO - 10.1109/SSIC.2016.7571810
M3 - Conference contribution
AN - SCOPUS:84992026501
T3 - 2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2016 - Proceedings
BT - 2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2016 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 18 July 2016 through 19 July 2016
ER -