메뉴 건너뛰기




Volumn , Issue , 2011, Pages 49-56

EDoS-shield - A two-steps mitigation technique against EDoS attacks in cloud computing

Author keywords

Cloud Computing; EDoS; Mitigation; Overlay Network; Virtual Firewall

Indexed keywords

CLOUD SERVICES; COMPUTING SYSTEM; DDOS ATTACK; DISCRETE SIMULATIONS; ECONOMIC RESOURCES; EDOS; END USERS; MITIGATION; MITIGATION TECHNIQUES; NETWORK RESOURCE; PAY-PER-USE; UTILITY COMPUTING; VIRTUAL FIREWALL;

EID: 84856328279     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UCC.2011.17     Document Type: Conference Paper
Times cited : (123)

References (43)
  • 2
    • 84856361952 scopus 로고    scopus 로고
    • available at
    • R. Knode, "BP Fuels Cloud Computing Interest", available at http://www.trustedcloudservices.com/Individual-Case-Studies/bp-fuels-cloud- computing-interest.
    • BP Fuels Cloud Computing Interest
    • Knode, R.1
  • 4
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility
    • R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: vision, hype and reality for delivering computing as the 5th utility", Future Generation Computer Systems, vol. 25 (6), 2009.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 5
    • 84856320336 scopus 로고    scopus 로고
    • Cloud Computing Security: From DDoS (Distributed Denial of Service) to EDoS (Economic Denial of Sustainability)
    • Retrieved November 27, available at
    • C. Hoff, "Cloud Computing Security: From DDoS (Distributed Denial Of Service) to EDoS (Economic Denial of Sustainability)", Blog, Retrieved November 27, 2008, available at http://rationalsecurity.typepad.com/blog/2008/ 11/cloud-computing-security-from-ddos-distributed-denial-of-service-to-edos- economic-denial-of-sustaina.html
    • (2008) Blog
    • Hoff, C.1
  • 7
    • 77954896637 scopus 로고    scopus 로고
    • Website, available at
    • "Amazon CloudWatch", Amazon Website, available at http://aws.amazon.com/cloudwatch/
    • Amazon CloudWatch
  • 16
    • 32544431722 scopus 로고    scopus 로고
    • Understanding when location-hiding using overlay networks is feasible
    • DOI 10.1016/j.comnet.2005.07.022, PII S1389128605002409
    • J. Wang and A. Chien, "Understanding when location-hiding using overlay networks is feasible", Journal of Computer Networks, vol. 50(6), pp.763-780, April 2006. (Pubitemid 43234333)
    • (2006) Computer Networks , vol.50 , Issue.6 , pp. 763-780
    • Wang, J.1    Chien, A.A.2
  • 18
    • 70349314701 scopus 로고    scopus 로고
    • CAPTCHA Security: A Case Study
    • Aug.
    • J. Yan and A.s. El Ahmad, "CAPTCHA Security: A Case Study", Security & Privacy, IEEE, vol. 7, pp. 22-28, Aug. 2009.
    • (2009) Security & Privacy, IEEE , vol.7 , pp. 22-28
    • Yan, J.1    El Ahmad, A.S.2
  • 24
    • 80054075678 scopus 로고    scopus 로고
    • An Autonomous Framework for Early Detection of Spoofed Flooding Attacks
    • Jan.
    • M. Subramanian and T. Angamuthu, "An Autonomous Framework for Early Detection of Spoofed Flooding Attacks", International Journal of Network Security, vol. 10, no. 1, pp. 39-50, Jan. 2010.
    • (2010) International Journal of Network Security , vol.10 , Issue.1 , pp. 39-50
    • Subramanian, M.1    Angamuthu, T.2
  • 25
    • 84856323641 scopus 로고    scopus 로고
    • System and method for detecting and eliminating IP spoofing in a data transmission network
    • US Patent 7,865,945 B2, Google Patents, Jan
    • C.F. Sharp and S. Dark, "System and method for detecting and eliminating IP spoofing in a data transmission network", US Patent 7,865,945 B2, Google Patents, Jan 2011.
    • (2011)
    • Sharp, C.F.1    Dark, S.2
  • 26
    • 84856320344 scopus 로고    scopus 로고
    • Methods and Systems for Load Balancing Using Forecasting and Overbooking Techniques
    • US Patent, Pub no. 2011/0078318 A1, Google Patents, March
    • N. Desai, S. Dillon, and D. Stone, "Methods and Systems for Load Balancing Using Forecasting and Overbooking Techniques", US Patent, Pub no. 2011/0078318 A1, Google Patents, March 2011.
    • (2011)
    • Desai, N.1    Dillon, S.2    Stone, D.3
  • 29
    • 84856344131 scopus 로고    scopus 로고
    • Method for protecting a firewall load balancer from a denial of service attack
    • US Patent 7,770,215 B2, Google Patents, Aug
    • C. O'rourke, G. Shah, L. Menditto, M. Albert, et al., "Method for protecting a firewall load balancer from a denial of service attack", US Patent 7,770,215 B2, Google Patents, Aug 2010.
    • (2010)
    • O'Rourke, C.1    Shah, G.2    Menditto, L.3    Albert, M.4
  • 31
    • 84856361949 scopus 로고    scopus 로고
    • White Paper, Jun 8, available at
    • VMware, Inc, White Paper, "vShield Edge Design Guide", Jun 8, 2011, available at http://www.vmware.com/files/pdf/techpaper/vShield-Edge- Design-Guide-WP.pdf
    • (2011) vShield Edge Design Guide
  • 32
    • 84856318701 scopus 로고    scopus 로고
    • available at
    • Cisco White Paper, "Secure Virtual Applications and Data Centers", 2011. available at http://www.cisco.com/en/US/solutions/ collateral/ns340/ns517/ns224/ns1097/white-paper-181-652663.html
    • (2011) Secure Virtual Applications and Data Centers
  • 33
    • 84856320345 scopus 로고    scopus 로고
    • White paper, available at
    • Savvis, Inc, White paper, "Securing-Virtual-Compute-Infrastructure- in-the-Cloud", 2011, available at http://www.savvis.com/en-US/Info-Center/ Documents/HOS-WhitePaper- SecuringVirutalComputeInfrastructureintheCloud.pdf
    • (2011) Securing-Virtual-Compute-Infrastructure-in-the-Cloud
  • 36
    • 0034336855 scopus 로고    scopus 로고
    • Analytical solution of finite capacity M/D/1 queues
    • DOI 10.1239/jap/1014843086
    • O. Brun, and M., Garcia, "Analytical Solution of Finite Capacity M/D/1 Queues", Journal of Applied Probability, vol. 37, no. 4, pp. 1092-1098, December 2000. (Pubitemid 33241074)
    • (2000) Journal of Applied Probability , vol.37 , Issue.4 , pp. 1092-1098
    • Brun, O.1    Garcia, J.-M.2
  • 37
    • 0035024566 scopus 로고    scopus 로고
    • Inferring network characteristics via moment-based estimators
    • S. Alouf, S. Nain, and D. Towsley, "Inferring Network Characteristics via Moment-Based Estimators", Proceeding of IEEE INFOCOM 2001, pp. 1045-1054, Anchorage, Alaska, April 2001. (Pubitemid 32478436)
    • (2001) Proceedings - IEEE INFOCOM , vol.2 , pp. 1045-1054
    • Alouf, S.1    Nain, P.2    Towsley, D.3
  • 39
    • 85013592037 scopus 로고
    • Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level
    • August
    • W. Willinger, M. Taqqu, R. Sherman, and D. Wilson, "Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level", Proceedings of ACM SIGCOMM, Cambridge, Massachusetts, pp. 100-113, August 1995.
    • (1995) Proceedings of ACM SIGCOMM, Cambridge, Massachusetts , pp. 100-113
    • Willinger, W.1    Taqqu, M.2    Sherman, R.3    Wilson, D.4
  • 43
    • 84870631425 scopus 로고    scopus 로고
    • available at
    • Amazon EC2 Pricing, available at http://aws.amazon.com/ec2/pricing/
    • Amazon EC2 Pricing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.