Multimedia Tools and Applications

, Volume 74, Issue 16, pp 6381–6390 | Cite as

A study on stable web server system using virtualization technology against attacks

  • Hwan-Seok Yang
  • Dong-Hwi Lee
  • Seung-Jae YooEmail author


Computing environment has greatly changed by development of computing technology and distribution of extensive network. But the damage is taken seriously while attack techniques are diverse and attack target also is increasing. Thus, the normal network service should be done coping with these attacks actively. In this study, we propose new technique that can provide collection of attack information using virtualization technology and stable web service. The collection of attack information is done dynamically in honey system and managed by HSC. The continuous service of web server is performed by LBC. The superior performance of proposed method is confirmed through experiment.


Virtualization Computer security DoS attack Honeypot 


  1. 1.
    Chen CL (2008) A new detection method for distributed denial-of-service attack track based on statistical test. J Univ Comput Sci 15:488–504Google Scholar
  2. 2.
    Dobrilovic D, Odadzic B (2006) “Virtualization technology as a tool for teaching computer networks,” Int J Soc Sci SpringGoogle Scholar
  3. 3.
    Francois J, Aib I, Boutaba R (2012) FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans Netw 20:1828–1841CrossRefGoogle Scholar
  4. 4.
    Fuertes W, López de Vergara JE (2007) “A quantitative comparison of virtual network environments based on performance measurements,” In Proc. 14th HP Software University Association Workshop, Munich, Germany, pp 8–11Google Scholar
  5. 5.
    Gupta BB, Joshi RC, Misra M (2012) ANN based scheme to predict number of zombies in DDoS attack. Int J Netw Secur 14:36–45Google Scholar
  6. 6.
    Ikinci A, Holz T, Freiling FC (2008) “Monkey-spider: detecting malicious websites with low-interaction Honeyclients,” In Sicherheit’08, pp 407–421Google Scholar
  7. 7.
    Keller J, Naues R (2006) “A collaborative virtual computer security Lab,” e-science, In Proc. Second IEEE International Conference on e-Science and Grid Computing (e-Science’06), Los Alamitos, CA, USA, pp 126Google Scholar
  8. 8.
    Kumar PAR, Selvakumar S (2011) Distributed denial of service attack detection using an ensemble of neural classifier. Comput Commun 34:1328–1341CrossRefGoogle Scholar
  9. 9.
    Li M, Li M (2009) “A new approach for detecting DDoS attacks based on wavelet analysis,” IEEE Proceedings of the 2nd International Congress on Image and Signal Processing, Tianjin, China, 17–19 October, pp 1–5Google Scholar
  10. 10.
    Paul O (2006) “Improving web servers focused DoS attacks detection,” in Proc. of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006), Tuebingen, GermanyGoogle Scholar
  11. 11.
    Pizzonia M, Rimondini M (2008) “NetKit: easy emulation of complex networks on inexpernsive hardware,” In Proc. TridentCom 2008, Innsbruck (Austria)Google Scholar
  12. 12.
    Provos N (2004) “A Virtual Honeypot Framework,” In proceedings of the 13th USENIX Security Symposium, pp 1–14Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Department of Information Security EngineeringJoongbu UniversityGeumsan-gunSouth Korea
  2. 2.Department of Industrial SecurityKyonggi UniversitySuwonSouth Korea

Personalised recommendations