{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:14:06Z","timestamp":1761401646519},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339400"},{"type":"electronic","value":"9783642339417"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33941-7_34","type":"book-chapter","created":{"date-parts":[[2012,10,31]],"date-time":"2012-10-31T15:27:42Z","timestamp":1351697262000},"page":"367-379","source":"Crossref","is-referenced-by-count":15,"title":["Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud"],"prefix":"10.1007","author":[{"given":"Alina M\u0103d\u0103lina","family":"Lonea","sequence":"first","affiliation":[]},{"given":"Daniela Elena","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Octavian","family":"Prostean","sequence":"additional","affiliation":[]},{"given":"Huaglory","family":"Tianfield","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Lonea, A.M., Popescu, D.E., Tianfield, H.: Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environment. International Journal of Computers, Communications & Control, IJCCC, 1841\u20139836 (accepted for publication, 2012) ISSN: 1841-9836","DOI":"10.15837\/ijccc.2013.1.170"},{"key":"34_CR2","unstructured":"Bhadauria, R., et al.: A Survey on Security Issues in Cloud Computing. CoRR (2011), http:\/\/dblp.uni-trier.de\/db\/journals\/corr\/corr1109.html#abs-1109-5388"},{"key":"34_CR3","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/ICCSN.2010.56","volume-title":"Second International Conference on Communication Software and Networks","author":"A. Bakshi","year":"2010","unstructured":"Bakshi, A., Yogesh, B.: Securing Cloud from DDoS Attacks using Intrusion Detection System in Virtual Machine. In: Second International Conference on Communication Software and Networks, pp. 260\u2013264. IEEE Computer Society, Washington, DC (2010)"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Dhage, S.N., et al.: Intrusion Detection System in Cloud Computing Environment. In: International Conference and Workshop on Emerging Trends in Technology (ICWET 2011), pp. 235\u2013239. TCET, Mumbai (2011)","DOI":"10.1145\/1980022.1980076"},{"key":"34_CR5","unstructured":"Lee, J.-H., Park, M.-W., Eom, J.-H., Chung, T.-M.: Multi-level Intrusion Detection System and Log Management in Cloud Computing. In: 13th International Conference on Advanced Communication Technology, ICACT 2011, Seoul, pp. 552\u2013555 (2011)"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/ICPPW.2010.46","volume-title":"39th International Conference on Parallel Processing Workshops","author":"C.-C. Lo","year":"2010","unstructured":"Lo, C.-C., Huang, C.-C., Ku, J.: A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. In: 39th International Conference on Parallel Processing Workshops, pp. 280\u2013284. IEEE Computer Society, Washington, DC (2010)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Mazzariello, C., Bifulco, R., Canonico, R.: Integrating a Network IDS into an Open Source Cloud Computing Environment. In: Sixth International Conference on Information Assurance and Security, pp. 265\u2013270 (2010)","DOI":"10.1109\/ISIAS.2010.5604069"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 729\u2013734 (2009)","DOI":"10.1109\/DASC.2009.94"},{"key":"34_CR9","unstructured":"Eucalyptus Administrator\u2019s Guide (2.0), http:\/\/open.eucalyptus.com\/wiki\/EucalyptusAdministratorGuide"},{"key":"34_CR10","unstructured":"Eucalyptus User\u2019s Guide (2.0), http:\/\/open.eucalyptus.com\/wiki\/EucalyptusUserGuide_v2.0"},{"key":"34_CR11","unstructured":"Weir, J.: Building a Debian\\Snort based IDS (2012), http:\/\/www.snort.org\/assets\/167\/IDS_deb_snort_howto.pdf"},{"key":"34_CR12","unstructured":"Moore, N.: Snort 2.9.1 CentOS 5.6 Installation Guide (2011), http:\/\/www.snort.org\/assets\/159\/Snort_2.9.1_CentOS_5.pdf"},{"key":"34_CR13","unstructured":"Harper, P.: Snort Enterprise Install (2007), http:\/\/www.internetsecurityguru.com\/documents\/Snort_Base_Barnyard_CentOS_5.pdf"},{"key":"34_CR14","unstructured":"Sourcefire, Inc.: Snort Users Manual 2.9.2 (2011), http:\/\/www.snort.org\/assets\/166\/snort_manual.pdf"},{"key":"34_CR15","unstructured":"Rehman, R. U. R.: Intrusion Detection with Snort: Advanced IDS Techniques using Snort, Apache, Mysql, PHP and ACID. Pearson Education Inc. Publishing as Prentice Hall PTR (2003)"},{"key":"34_CR16","unstructured":"Baker, A.R., Esler, J.: Snort Intrusion Detection and Prevention Toolkit. Syngress Publishing, Inc. (2007)"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Vanathi, R., Gunasekaran, S.: Comparison of Network Intrusion Detection Systems in Cloud Computing Environment. In: 2012 International Conference on Computer Communication and Informatics (ICCCI 2012), Coimbatore, India (2012)","DOI":"10.1109\/ICCCI.2012.6158820"},{"key":"34_CR18","unstructured":"Brennan, M.P.: Using Snort for a Distributed Intrusion Detection System. SANS Institute, Version 1.3 (2002), http:\/\/www.sans.org\/reading_room\/whitepapers\/detection\/snort-distributed-intrusion-detection-system_352"},{"key":"34_CR19","unstructured":"Borisaniya, B., Patel, A., Patel, R., Patel, D.: Network-based Intrusion Detection in Eucalyptus Private Cloud. In: 2010 International Conference on Advances in Communication, Network, and Computing, India, pp. 209\u2013212 (2010)"},{"key":"34_CR20","unstructured":"Skinner III, W.T.: Identity Management in a Public IaaS Cloud. James Madison University. Master Thesis (2012), http:\/\/www.scribd.com\/doc\/90183632\/3\/Thesis-Statement"},{"key":"34_CR21","unstructured":"Dittrich, D.: The \u201cstacheldraht\u201d distributed denial of service attack tool. University of Washington (1999), http:\/\/staff.washington.edu\/dittrich\/misc\/stacheldraht.analysis.txt"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Criscuolo, P.J.: Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht. CIAC-2319. Department of Enery Computer Incident Advisory Capability, UCRL-ID-136939, Rev.1, Lawrence Livermore National Laboratory, https:\/\/e-reports-ext.llnl.gov\/pdf\/237595.pdf (2000)","DOI":"10.2172\/792253"},{"key":"34_CR23","unstructured":"Specht, S.M., Lee, R.B.: Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures. In: Proceedings of the 17th International Conference on Parallel and Distributed Systems, pp. 543\u2013550 (2004)"},{"issue":"2","key":"34_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Martin, J., Reiher, P.: A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review\u00a034(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"34_CR25","unstructured":"Northcutt, S., Novak, J.: Network Intrusion Detection, 3rd edn. New Riders Publishing (2002) ISBN 0-73571-265-4"},{"key":"34_CR26","unstructured":"w3schools.com, http:\/\/www.w3schools.com\/sql\/sql_join.asp"},{"issue":"5","key":"34_CR27","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/24.106778","volume":"40","author":"M.A.S. Guth","year":"1991","unstructured":"Guth, M.A.S.: A Probabilistic Foundation for Vagueness & Imprecision in Fault-Tree Analysis. IEEE Transactions on Reliability\u00a040(5), 563\u2013569 (1991)","journal-title":"IEEE Transactions on Reliability"},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Yu, D., Frincke, D.: Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory. In: Proceedings of the 43rd ACM Southeast Conference. ACM-SE, vol.\u00a043, pp. 142\u2013147 (2005)","DOI":"10.1145\/1167253.1167289"},{"key":"34_CR29","unstructured":"Thomas, C., Balakrishnan, N.: Performance Enhancement of Intrusion Detection Systems using advances in sensor fusion. In: 11th International Conference on Information Fusion, pp. 1\u20137 (2008)"},{"key":"34_CR30","volume-title":"Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining. In: Practical Machine Learning Tools and Techniques, 2nd edn. Kaufmann Press, San Francisco (2005)","edition":"2"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33941-7_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T19:00:06Z","timestamp":1643569206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33941-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642339400","9783642339417"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33941-7_34","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}