메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1046-1050

Study of multistage anomaly detection for secured cloud computing resources in future internet

Author keywords

Cloud Computing; Dark IP; DDoS Attack; Multistage Anomaly Detection; P2P DDoS

Indexed keywords

ANOMALY DETECTION; ATTACK PATTERNS; BAYESIAN METHODS; COMPUTING RESOURCE; DARK IP; DDOS ATTACK; FUTURE INTERNET; MISUSE DETECTION; P2P DDOS; VIRTUALIZATIONS; VOLUME DATA;

EID: 84862973274     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DASC.2011.171     Document Type: Conference Paper
Times cited : (19)

References (20)
  • 2
    • 84862910902 scopus 로고    scopus 로고
    • Gartner, http://www.gartner.com/
  • 4
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defence mechanisms
    • April
    • Jelena Mirkovic, Peter Reiher, A taxonomy of DDoS attack and DDoS defence mechanisms. ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 2, April 2004.
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.2
    • Mirkovic, J.1    Reiher, P.2
  • 7
    • 84862971480 scopus 로고    scopus 로고
    • DDoS MITIGATION: Best Practices for a Rapidly Changing Threat Landscape
    • DDoS MITIGATION: Best Practices for a Rapidly Changing Threat Landscape. VERSIGN White paper.
    • VERSIGN White Paper
  • 8
    • 84862971482 scopus 로고    scopus 로고
    • Pre-study of Multistage Anomaly Detection of DDoS Attacks in Cloud Resource
    • YongIl Kim, Byungrae Cha, and Jongwon Kim, "Pre-study of Multistage Anomaly Detection of DDoS Attacks in Cloud Resource,"YES-ICuC 2011, August 2011.
    • YES-ICuC 2011, August 2011
    • Kim, Y.1    Cha, B.2    Kim, J.3
  • 11
    • 84862971483 scopus 로고    scopus 로고
    • GENI, http://www.geni.net
  • 12
    • 84862916108 scopus 로고    scopus 로고
    • GENICloud, http://groups.geni.net/geni/wiki/GENICloud
  • 13
    • 84862916107 scopus 로고    scopus 로고
    • NEuca, https://geni-orca.renci.org/trac/wiki/NEuca-overview
  • 14
    • 84862916106 scopus 로고    scopus 로고
    • Eucalyptus, http://www.eucalyptus.com/
  • 15
    • 84862916114 scopus 로고    scopus 로고
    • http://cloutage.org/incident-types
  • 16
    • 84862916103 scopus 로고    scopus 로고
    • Sep. 8
    • http://www.infosecurity-us.com/view/3832/us-academics-develop-cloud- attack-methodology-/. Sep. 8, 2009.
    • (2009)
  • 17
    • 84862910904 scopus 로고    scopus 로고
    • Oct. 5
    • http://www.theregister.co.uk/2009/10/05/amazon-bitbucket-outage/. Oct. 5, 2009.
    • (2009)
  • 18
    • 84862926857 scopus 로고    scopus 로고
    • May 15
    • http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been- invaded-by-hackers-using-amazon-com-server.html. May 15, 2011.
    • (2011)
  • 19
    • 84862910905 scopus 로고    scopus 로고
    • March 10
    • http://www.infoworld.com/d/cloud-computing/afraid-outside-cloud-attacks- youre-missing-real-threat-894. March 10, 2010.
    • (2010)
  • 20
    • 84862916112 scopus 로고    scopus 로고
    • Jan. 25
    • http://www.elasticvapor.com/2009/01/cloud-attack-economic-denial-of.html. Jan. 25, 2009.
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.