Clustering methods comparison: Application to source based detection of botclouds

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Recently, cloud computing has conquered IT markets and majority of institutions use its services at different scales. As any IT technology, cloud computing suffers from security issues and numerous studies were - and in progress - given in order to overcome them. However, most of the latter focus on data, users and infrastructure security from external attacks, and very few ones focus on the issue of using the cloud's infrastructure as an attack tool or support. To address the issue of botnets hosted in the cloud, we realized an experimental campaign where we implemented a botnet on a virtualized infrastructure and realized numerous attacks. The collected data was exploited in order to study and compare the effectiveness of clustering methods in the detection of DDoS attacks generated by botnets in the cloud.

Original languageEnglish
Title of host publication2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509024704
DOIs
Publication statusPublished - 19 Sept 2016
Event2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2016 - Paris, France
Duration: 18 Jul 201619 Jul 2016

Publication series

Name2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2016 - Proceedings

Conference

Conference2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2016
Country/TerritoryFrance
CityParis
Period18/07/1619/07/16

Keywords

  • Botcloud
  • DDoS
  • botnet
  • cloud security
  • clustering
  • egress detection
  • source based detection

Fingerprint

Dive into the research topics of 'Clustering methods comparison: Application to source based detection of botclouds'. Together they form a unique fingerprint.

Cite this