메뉴 건너뛰기




Volumn , Issue , 2011, Pages 33-40

Exploiting cloud utility models for profit and ruin

Author keywords

Anomaly detection; Application layer DDoS; Cloud computing; Fraudulent resource consumption attack; Utility compute model

Indexed keywords

ANOMALY DETECTION; APPLICATION-LAYER DDOS; CLOUD SERVICES; COMPUTE MODEL; OPERATING EXPENSE; RESOURCE CONSUMPTION; UTILITY MODEL;

EID: 80053144966     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2011.45     Document Type: Conference Paper
Times cited : (49)

References (19)
  • 1
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • April
    • J. Mirkovic and P. Reiher, "A taxonomy of ddos attack and ddos defense mechanisms," SIGCOMM Comput. Commun. Rev., vol. 34, pp. 39-53, April 2004.
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 2
    • 84870631425 scopus 로고    scopus 로고
    • Nov. [Online]
    • Amazon Web Services. (2010, Nov.) Amazon EC2 pricing. [Online]. Available: http://aws.amazon.com/ec2/pricing/
    • (2010) Amazon EC2 Pricing
  • 7
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
    • New York, NY, USA: ACM
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: characterization and implications for cdns and web sites," in Proceedings of the 11th international conference on World Wide Web. New York, NY, USA: ACM, 2002, pp. 293-304.
    • (2002) Proceedings of the 11th International Conference on World Wide Web , pp. 293-304
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 11
    • 56049089379 scopus 로고    scopus 로고
    • An investigation of zipf's law for fraud detection
    • December
    • S.-M. Huang, D. C. Yen, L.-W. Yang, and J.-S. Hua, "An investigation of zipf's law for fraud detection," Decis. Support Syst., vol. 46, pp. 70-83, December 2008.
    • (2008) Decis. Support Syst. , vol.46 , pp. 70-83
    • Huang, S.-M.1    Yen, D.C.2    Yang, L.-W.3    Hua, J.-S.4
  • 12
    • 0032670943 scopus 로고    scopus 로고
    • Web caching and zipf-like distributions: Evidence and implications
    • Mar. 1
    • L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and zipf-like distributions: evidence and implications," in Proceedings of IEEE INFOCOM '99, vol. 1, Mar. 1999, pp. 126-134 Vol.1.
    • (1999) Proceedings of IEEE INFOCOM '99 , vol.1 , pp. 126-134
    • Breslau, L.1    Cao, P.2    Fan, L.3    Phillips, G.4    Shenker, S.5
  • 13
    • 77951521869 scopus 로고    scopus 로고
    • Sessionsim: Activity-based session generation for network simulation
    • Proceedings of the 2009
    • L. Kroc, S. Eidenbenz, and J. Smith, "Sessionsim: Activity-based session generation for network simulation," in Winter Simulation Conference (WSC), Proceedings of the 2009, 2009, pp. 3169-3180.
    • (2009) Winter Simulation Conference (WSC) , pp. 3169-3180
    • Kroc, L.1    Eidenbenz, S.2    Smith, J.3
  • 17
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer ddos attacks for popular websites
    • IEEE/ACM Transactions on
    • Y. Xie and S.-Z. Yu, "Monitoring the application-layer ddos attacks for popular websites," Networking, IEEE/ACM Transactions on, vol. 17, no. 1, pp. 15-25, 2009.
    • (2009) Networking , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 19
    • 61449207953 scopus 로고    scopus 로고
    • DDoS-shield: Ddos-resilient scheduling to counter application layer attacks
    • February
    • S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, "DDoS-shield: DDoS-resilient scheduling to counter application layer attacks," IEEE/ACM Trans. Netw., vol. 17, pp. 26-39, February 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , pp. 26-39
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Nucci, A.4    Knightly, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.