메뉴 건너뛰기




Volumn , Issue , 2012, Pages 429-434

Detecting and mitigating HX-DoS attacks against cloud web services

Author keywords

Cloud Security; Cyber Physical Systems; HX Denial of Service Attacks

Indexed keywords

ATTACK TRAFFIC; CLOUD SERVICES; CYBER PHYSICAL SYSTEMS (CPSS); DEFENCE SYSTEMS; DENIAL OF SERVICE; FALSE POSITIVE; PHYSICAL WORLD; SECURITY PROBLEMS; SERVICE ATTACK; SOFTWARE-AS-A-SERVICE; THREE MODELS;

EID: 84870803934     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NBiS.2012.146     Document Type: Conference Paper
Times cited : (50)

References (34)
  • 2
    • 84870776729 scopus 로고    scopus 로고
    • last accessed 30/03/2012
    • SOAP 1.1, (2008), http://www.w3.org/TR/soap/, last accessed 30/03/2012
    • (2008) SOAP 1.1
  • 4
    • 34147099073 scopus 로고    scopus 로고
    • Survey of Network- Based Defense Mechanisms Countering the DoS and DDoS Problems
    • Article 3
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network- Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Surveys, vol. 39, no. 1, Article 3, 2007.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 5
    • 33947503628 scopus 로고    scopus 로고
    • Defense Against Spoofed IP Traffic Using Hop-Count Filtering
    • H. Wang, C. Jin, and K. G. Shin, "Defense Against Spoofed IP Traffic Using Hop-Count Filtering," IEEE/ACM Transactions on Networking, vol. 15, no. 1 pages 40-53, 2007,
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 7
    • 34247601459 scopus 로고    scopus 로고
    • A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
    • R. Chen, J. Park, and R. Marchany, "A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577-588, 2007.
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.5 , pp. 577-588
    • Chen, R.1    Park, J.2    Marchany, R.3
  • 8
    • 70350422660 scopus 로고    scopus 로고
    • Chaos Theory Based Detection against Network Mimicking DDoS Attacks
    • Sept.
    • A. Chonka, W. Zhou, and J. Singh, "Chaos Theory Based Detection against Network Mimicking DDoS Attacks", IEEE Communications Letters, Volume 13, Issue 9, pages 717-719, Sept. 2009,.
    • (2009) IEEE Communications Letters , vol.13 , Issue.9 , pp. 717-719
    • Chonka, A.1    Zhou, W.2    Singh, J.3
  • 9
    • 33749831619 scopus 로고    scopus 로고
    • StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
    • A. Yaar, A. Perrig, and D. Song, "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense," IEEE Journal of Selected Areas in Communication, vol. 24, no. 10, 2006.
    • (2006) IEEE Journal of Selected Areas in Communication , vol.24 , Issue.10
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 13
    • 79956153885 scopus 로고    scopus 로고
    • Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XMLDoS Attacks
    • Elsevier
    • A.Chonka, Y.Xiang, W. Zhou, and A. Bonti, , Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XMLDoS Attacks, Journal of Network and Computer Applications, Elsevier, vol. 3, no. 4, pages 1097-1107, 2011.
    • (2011) Journal of Network and Computer Applications , vol.3 , Issue.4 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Zhou, W.3    Bonti, A.4
  • 14
    • 67349095739 scopus 로고    scopus 로고
    • A decision support system for constructing an alert classification model
    • October
    • N.Y Jan, S.C. Lin, S.S. Tseng,, N.P. Lin, "A decision support system for constructing an alert classification model" Expert Systems with Applications, Volume 36, Issue 8, Pages 11145-11155, October 2009
    • (2009) Expert Systems with Applications , vol.36 , Issue.8 , pp. 11145-11155
    • Jan, N.Y.1    Lin, S.C.2    Tseng, S.S.3    Lin, N.P.4
  • 15
    • 40649126581 scopus 로고    scopus 로고
    • Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
    • June
    • S. Noh, G. Jung, K. Choi, C. Lee, "Compiling network traffic into rules using soft computing methods for the detection of flooding attacks" Applied Soft Computing, Volume 8, Issue 3, pages 1200-1210, June 2008.
    • (2008) Applied Soft Computing , vol.8 , Issue.3 , pp. 1200-1210
    • Noh, S.1    Jung, G.2    Choi, K.3    Lee, C.4
  • 16
    • 40849099949 scopus 로고    scopus 로고
    • Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
    • 1 May
    • C.Xiang, P.C.Yong, and L.S. Meng, "Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees", Pattern Recognition Letters, Volume 29, Issue 7, pages 918-924, 1 May 2008
    • (2008) Pattern Recognition Letters , vol.29 , Issue.7 , pp. 918-924
    • Xiang, C.1    Yong, P.C.2    Meng, L.S.3
  • 18
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • September
    • C. Yu and H. Kai , "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis", Journal of Parallel and Distributed Systems, Volume 66, Issue 9, pages 1137-1151, September 2006.
    • (2006) Journal of Parallel and Distributed Systems , vol.66 , Issue.9 , pp. 1137-1151
    • Yu, C.1    Kai, H.2
  • 26
    • 84870789004 scopus 로고    scopus 로고
    • StuPot Project, Deakin University, last accessed 30th March
    • StuPot Project, "HXDoS Dataset", Deakin University, http://www.deakin.edu.au/~chonka/ , last accessed 30th March, 2012.
    • (2012) HXDoS Dataset
  • 28
    • 8344244591 scopus 로고    scopus 로고
    • An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
    • October
    • M. Li, An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition, Computers & Security, Volume 23, Issue 7, October 2004, Pages 549-558.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 549-558
    • Li, M.1
  • 29
    • 77953077374 scopus 로고    scopus 로고
    • Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites
    • J. Jung and B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In WWW, Hawaii, May 2002.
    • WWW, Hawaii, May 2002
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 32
    • 51849153577 scopus 로고    scopus 로고
    • XML -Signature, last accessed 03/04/2012
    • XML -Signature, 'XML-Signature Syntax and Processing' http://www.w3.org/TR/xmldsig-core/ last accessed 03/04/2012.
    • XML-Signature Syntax and Processing
  • 33
    • 51849153577 scopus 로고    scopus 로고
    • XML- Encryption, last accessed 03/04/2012
    • XML- Encryption, 'XML-Signature Syntax and Processing' http://www.w3.org/TR/xmlenc-core/ last accessed 03/04/2012.
    • XML-Signature Syntax and Processing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.