Skip to main content
Log in

A study on stable web server system using virtualization technology against attacks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Computing environment has greatly changed by development of computing technology and distribution of extensive network. But the damage is taken seriously while attack techniques are diverse and attack target also is increasing. Thus, the normal network service should be done coping with these attacks actively. In this study, we propose new technique that can provide collection of attack information using virtualization technology and stable web service. The collection of attack information is done dynamically in honey system and managed by HSC. The continuous service of web server is performed by LBC. The superior performance of proposed method is confirmed through experiment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Chen CL (2008) A new detection method for distributed denial-of-service attack track based on statistical test. J Univ Comput Sci 15:488–504

    Google Scholar 

  2. Dobrilovic D, Odadzic B (2006) “Virtualization technology as a tool for teaching computer networks,” Int J Soc Sci Spring

  3. Francois J, Aib I, Boutaba R (2012) FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans Netw 20:1828–1841

    Article  Google Scholar 

  4. Fuertes W, López de Vergara JE (2007) “A quantitative comparison of virtual network environments based on performance measurements,” In Proc. 14th HP Software University Association Workshop, Munich, Germany, pp 8–11

  5. Gupta BB, Joshi RC, Misra M (2012) ANN based scheme to predict number of zombies in DDoS attack. Int J Netw Secur 14:36–45

    Google Scholar 

  6. Ikinci A, Holz T, Freiling FC (2008) “Monkey-spider: detecting malicious websites with low-interaction Honeyclients,” In Sicherheit’08, pp 407–421

  7. Keller J, Naues R (2006) “A collaborative virtual computer security Lab,” e-science, In Proc. Second IEEE International Conference on e-Science and Grid Computing (e-Science’06), Los Alamitos, CA, USA, pp 126

  8. Kumar PAR, Selvakumar S (2011) Distributed denial of service attack detection using an ensemble of neural classifier. Comput Commun 34:1328–1341

    Article  Google Scholar 

  9. Li M, Li M (2009) “A new approach for detecting DDoS attacks based on wavelet analysis,” IEEE Proceedings of the 2nd International Congress on Image and Signal Processing, Tianjin, China, 17–19 October, pp 1–5

  10. Paul O (2006) “Improving web servers focused DoS attacks detection,” in Proc. of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006), Tuebingen, Germany

  11. Pizzonia M, Rimondini M (2008) “NetKit: easy emulation of complex networks on inexpernsive hardware,” In Proc. TridentCom 2008, Innsbruck (Austria)

  12. Provos N (2004) “A Virtual Honeypot Framework,” In proceedings of the 13th USENIX Security Symposium, pp 1–14

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seung-Jae Yoo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, HS., Lee, DH. & Yoo, SJ. A study on stable web server system using virtualization technology against attacks. Multimed Tools Appl 74, 6381–6390 (2015). https://doi.org/10.1007/s11042-014-2109-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2109-9

Keywords

Navigation