-
1
-
-
84872847706
-
Detecting distributed denial of service (ddos) attacks in cloud computing environment
-
accepted for publication, ISSN: 1841-9836
-
Lonea, A.M., Popescu, D.E., Tianfield, H.: Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environment. International Journal of Computers, Communications & Control, IJCCC, 1841-9836 (accepted for publication, 2012) ISSN: 1841-9836
-
(2012)
International Journal of Computers, Communications & Control, IJCCC
, pp. 1841-9836
-
-
Lonea, A.M.1
Popescu, D.E.2
Tianfield, H.3
-
3
-
-
77952344255
-
Securing cloud from ddos attacks using intrusion detection system in virtual machine
-
IEEE Computer Society, Washington, DC
-
Bakshi, A., Yogesh, B.: Securing Cloud from DDoS Attacks using Intrusion Detection System in Virtual Machine. In: Second International Conference on Communication Software and Networks, pp. 260-264. IEEE Computer Society, Washington, DC (2010)
-
(2010)
Second International Conference on Communication Software and Networks
, pp. 260-264
-
-
Bakshi, A.1
Yogesh, B.2
-
5
-
-
79955677448
-
Multi-level intrusion detection system and log management in cloud computing
-
Lee, J.-H., Park, M.-W., Eom, J.-H., Chung, T.-M.: Multi-level Intrusion Detection System and Log Management in Cloud Computing. In: 13th International Conference on Advanced Communication Technology, ICACT 2011, Seoul, pp. 552-555 (2011)
-
(2011)
13th International Conference on Advanced Communication Technology, ICACT 2011, Seoul
, pp. 552-555
-
-
Lee, J.-H.1
Park, M.-W.2
Eom, J.-H.3
Chung, T.-M.4
-
6
-
-
78649815408
-
A cooperative intrusion detection system framework for cloud computing networks
-
IEEE Computer Society, Washington, DC
-
Lo, C.-C., Huang, C.-C., Ku, J.: A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. In: 39th International Conference on Parallel Processing Workshops, pp. 280-284. IEEE Computer Society, Washington, DC (2010)
-
(2010)
39th International Conference on Parallel Processing Workshops
, pp. 280-284
-
-
Lo, C.-C.1
Huang, C.-C.2
Ku, J.3
-
7
-
-
78349296456
-
Integrating a network ids into an open source cloud computing environment
-
Mazzariello, C., Bifulco, R., Canonico, R.: Integrating a Network IDS into an Open Source Cloud Computing Environment. In: Sixth International Conference on Information Assurance and Security, pp. 265-270 (2010)
-
(2010)
Sixth International Conference on Information Assurance and Security
, pp. 265-270
-
-
Mazzariello, C.1
Bifulco, R.2
Canonico, R.3
-
8
-
-
77950559014
-
Intrusion detection in the cloud
-
Roschke, S., Cheng, F., Meinel, C.: Intrusion Detection in the Cloud. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 729-734 (2009)
-
(2009)
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
11
-
-
84872840823
-
-
Weir, J.: Building a Debian\Snort based IDS
-
Weir, J.: Building a Debian\Snort based IDS (2012), http://www.snort.org/ assets/167/IDS-deb-snort-howto.pdf
-
(2012)
-
-
-
13
-
-
84947196434
-
-
Harper, P.: Snort Enterprise Install (2007), http://www. internetsecurityguru.com/documents/Snort-Base-Barnyard-CentOS-5.pdf
-
(2007)
Snort Enterprise Install
-
-
Harper, P.1
-
14
-
-
84872876859
-
-
Sourcefire, Inc.: Snort Users Manual 2.9.2
-
Sourcefire, Inc.: Snort Users Manual 2.9.2 (2011), http://www.snort.org/ assets/166/snort-manual.pdf
-
(2011)
-
-
-
19
-
-
84872858645
-
Network-based intrusion detection in eucalyptus private cloud
-
India
-
Borisaniya, B., Patel, A., Patel, R., Patel, D.: Network-based Intrusion Detection in Eucalyptus Private Cloud. In: 2010 International Conference on Advances in Communication, Network, and Computing, India, pp. 209-212 (2010)
-
(2010)
2010 International Conference on Advances in Communication, Network, and Computing
, pp. 209-212
-
-
Borisaniya, B.1
Patel, A.2
Patel, R.3
Patel, D.4
-
20
-
-
84872866416
-
-
James Madison University. Master Thesis
-
Skinner III, W.T.: Identity Management in a Public IaaS Cloud. James Madison University. Master Thesis (2012), http://www.scribd.com/doc/90183632/3/ Thesis-Statement
-
(2012)
Identity Management in A Public IaaS Cloud
-
-
Skinner, W.T.1
-
22
-
-
0008723266
-
-
CIAC-2319. Department of Enery Computer Incident Advisory Capability, UCRL-ID-136939, Rev.1, Lawrence Livermore National Laboratory, https://e-reports-ext.llnl.gov/pdf/237595.pdf
-
Criscuolo, P.J.: Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht. CIAC-2319. Department of Enery Computer Incident Advisory Capability, UCRL-ID-136939, Rev.1, Lawrence Livermore National Laboratory, https://e-reports-ext.llnl.gov/pdf/237595.pdf (2000)
-
(2000)
Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht
-
-
Criscuolo, P.J.1
-
24
-
-
11144272176
-
A taxonomy of ddos attacks and ddos defense mechanisms
-
Mirkovic, J., Martin, J., Reiher, P.: A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review 34(2), 39-53 (2004)
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
26
-
-
84872844295
-
-
w3schools.com
-
w3schools.com, http://www.w3schools.com/sql/sql-join.asp
-
-
-
-
27
-
-
0026370874
-
A probabilistic foundation for vagueness & imprecision in fault-tree analysis
-
Guth, M.A.S.: A Probabilistic Foundation for Vagueness & Imprecision in Fault-Tree Analysis. IEEE Transactions on Reliability 40(5), 563-569 (1991)
-
(1991)
IEEE Transactions on Reliability
, vol.40
, Issue.5
, pp. 563-569
-
-
Guth, M.A.S.1
-
28
-
-
67349127851
-
Alert confidence fusion in intrusion detection systems with extended dempster-shafer theory
-
Yu, D., Frincke, D.: Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory. In: Proceedings of the 43rd ACM Southeast Conference. ACM-SE, vol. 43, pp. 142-147 (2005)
-
(2005)
Proceedings of the 43rd ACM Southeast Conference. ACM-SE
, vol.43
, pp. 142-147
-
-
Yu, D.1
Frincke, D.2
|