Mobile Networks and Applications

, Volume 18, Issue 1, pp 122–128 | Cite as

A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed

  • Junwon Lee
  • Jaeik Cho
  • Jungtaek Seo
  • Taeshik Shon
  • Dongho Won


Recent developments have caused the expansion of various cloud computing environments and services. Cloud computing environments have led to research in the areas of data processing, virtual environments, and access control. Information security is the most important research area for these environments security. In this study, we analyzed typical example of network testbeds, which have been used for malicious activity data collection and its subsequent analysis. Further, we propose an effective malicious network application testbed, which is based on a cloud system. We also verified the performance of our new testbed by comparing real malicious activity with the cloud-based testbed results.


mobile cloud cloud test bed cloud network anomaly 



This paper is extended research based on an already published MCCTA 2011 conference paper. This version of the extended paper includes further experiments and updated sections, which were the most significant issues.


  1. 1.
    Armbrust M, Fox A et al (2009) Above the clouds: a Berkeley view of cloud computing. Tech Report No. UCB/EECS-2009-28,
  2. 2.
    Sharif M, Yegneswaran V et al (2008) Eureka: a framework for enabling static malware analysis, LNCS Volume 5283Google Scholar
  3. 3.
    Mell P, Grance T (2009) The NIST definition of cloud computing. Nat Instit Stand Technol 53:50,
  4. 4.
    Moreno-Vozmediano R, Montero RS and Llorente IM (2009) Elastic management of cluster-based services in the cloud, In Proceedings of the 1st workshop on Automated control for datacenters and clouds (ACDC ’09) ACMGoogle Scholar
  5. 5.
    Vaquero LM, Rodero-Merino L, Caceres J and Lindner M (2008) A break in the clouds: towards a cloud definition. SIGCOMM Comput Commun Rev 39Google Scholar
  6. 6.
    The Kasumigaseki Cloud Concept.
  7. 7.
    Hiroaki H, Kamizuru Y, Honda A et al (2010) Dynamic IP-VPN architecture for cloud computing, Information and Telecommunication Technologies (APSITT)Google Scholar
  8. 8.
    Lippmann RP, Fried DJ, Graf I et al (2000) Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, DARPA Information Survivability Conference and ExpositionGoogle Scholar
  9. 9.
    Lee W, Stolfo SJ (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf Syst Secur 3Google Scholar
  10. 10.
    McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst SecurGoogle Scholar
  11. 11.
    Mahoney MV, Chan PK (2003) An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection, LNCSGoogle Scholar
  12. 12.
    Sotomayor B, Montero RS, Llorente IM, Foster I (2009) Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput vol.13, no.5Google Scholar
  13. 13.
    Xen Cloud platform.
  14. 14.

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Junwon Lee
    • 1
  • Jaeik Cho
    • 2
  • Jungtaek Seo
    • 3
  • Taeshik Shon
    • 4
  • Dongho Won
    • 1
  1. 1.School of Information and Communication EngineeringSungkyunkwan UniversitySuwonRepublic of Korea
  2. 2.Graduate School of Information SecurityKorea UniversitySuwonRepublic of Korea
  3. 3.The Attached Institute of ETRISuwonRepublic of Korea
  4. 4.Division of Information Computer EngineeringAjou UniversitySuwonRepublic of Korea

Personalised recommendations