Find a copy online
Links to this item
Find a copy in the library
Details
Genre/Form: | Thèses et écrits académiques |
---|---|
Material Type: | Document, Thesis/dissertation, Internet resource |
Document Type: | Internet Resource, Computer File |
All Authors / Contributors: |
Badis Hammi; Guillaume Doyen; Rida Khatoun; Université de technologie (Troyes).; Ecole doctorale Sciences pour l'Ingénieur (Troyes, Aube). |
OCLC Number: | 941521683 |
Notes: | Titre provenant de l'écran-titre. |
Description: | 1 online resource |
Responsibility: | Badis Hammi ; sous la direction de Guillaume Doyen et de Rida Khatoun. |
Abstract:
Currently, cloud computing is a flexible and cost-effective solution widely adopted for the large-scale production of IT services. However, beyond a main legitimate usage, malicious users take advantage of these features in order to get a ready-to-use attack platform, offering a massive power. Among the greatest beneficiaries of this cloud conversion into an attack support, botclouds are used to perpetrate Distributed Denial of Service (DDoS) attacks toward any third party connected to the Internet.Although such attacks, when perpetrated by botnets, have been extensively studied in the past, their operations and their implementation context are different herein and thus require new solutions. In order to achieve such a goal, we propose in the thesis work presented in this manuscript, a distributed approach for a source-based detection of DDoS attacks perpetrated by virtual machines hosted in a public cloud. Firstly, we present an experimental study that consists in the implementation of two botclouds in a real deployment environment hosting a legitimate workload. The analysis of the collected data allows the deduction of behavioural invariants that form the basis of a signature based detection system. Then, we present in the following a detection system based on the identification of principal components of the deployed botclouds. Finally, in order to deal with the scalability issues, we propose a distributed solution of our detection system, which relies on a mesh peer-to- peer architecture resulting from the overlap of several overlay trees.
Reviews

