메뉴 건너뛰기




Volumn 29, Issue 7, 2013, Pages 1838-1850

A confidence-based filtering method for DDoS attack defense in cloud environment

Author keywords

Cloud environment; Confidence; Correlation characteristic; Distributed denial of service attack; Filtering; Network security

Indexed keywords

COMPUTER CRIME; FILTRATION; NETWORK SECURITY;

EID: 84885197342     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2012.12.011     Document Type: Article
Times cited : (88)

References (23)
  • 1
    • 77950347409 scopus 로고    scopus 로고
    • A view of cloud computing
    • M. Armbrust, et al., A view of cloud computing, Commun. ACM 53 (4) (2010) 50-58.
    • (2010) Commun. ACM , vol.53 , Issue.4 , pp. 50-58
    • Armbrust, M.1
  • 3
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • T. Peng, C. Leckie, K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Comput. Surv. 39 (1) (2007) 3.
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1 , pp. 3
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 4
    • 70350422660 scopus 로고    scopus 로고
    • Chaos theory based detection against network mimicking DDoS attacks
    • A. Chonka, J. Singh, W. Zhou, Chaos theory based detection against network mimicking DDoS attacks, IEEE Commun. Lett. 13 (9) (2009) 717-719.
    • (2009) IEEE Commun. Lett. , vol.13 , Issue.9 , pp. 717-719
    • Chonka, A.1    Singh, J.2    Zhou, W.3
  • 5
    • 79957530146 scopus 로고    scopus 로고
    • Low-rate DDoS attacks detection and traceback by using new information metrics
    • Y. Xiang, K. Li, W. Zhou, Low-rate DDoS attacks detection and traceback by using new information metrics, IEEE Trans. Inf. Forensics Secur. 6 (2) (2011) 426-437.
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 7
    • 33646742035 scopus 로고    scopus 로고
    • Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Y. Kim, W.C. Lau, M.C. Chuah, H.J. Chao, Packetscore: a statistics-based packet filtering scheme against distributed denial-of-service attacks, IEEE Trans. Dependable Secure Comput. 3 (2) (2006) 141-155.
    • (2006) IEEE Trans. Dependable Secure Comput. , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 8
    • 33749824252 scopus 로고    scopus 로고
    • ALPi: A DDoS defense system for highspeed networks
    • P.E. Ayres, H. Sun, H.J. Chao, W.C. Lau, ALPi: a DDoS defense system for highspeed networks, IEEE J. Sel. Areas Commun. 24 (10) (2006) 1864-1876.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.10 , pp. 1864-1876
    • Ayres, P.E.1    Sun, H.2    Chao, H.J.3    Lau, W.C.4
  • 9
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • DOI 10.1109/TNET.2006.890133
    • H. Wang, C. Jin, K.G. Shin, Defense against spoofed IP traffic using hop-count filtering, IEEE/ACM Trans. Netw. 15 (1) (2007) 40-53. (Pubitemid 46464416)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 13
    • 40749152296 scopus 로고    scopus 로고
    • Probabilistic packet marking for large-scale IP traceback
    • DOI 10.1109/TNET.2007.910594
    • M.T. Goodrich, Probabilistic packet marking for large-scale IP traceback, IEEE/ACM Trans. Netw. 16 (1) (2008) 15-24. (Pubitemid 351386752)
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.1 , pp. 15-24
    • Goodrich, M.T.1
  • 14
    • 67649889403 scopus 로고    scopus 로고
    • Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
    • Y. Xiang, W. Zhou, M. Guo, Flexible deterministic packet marking: an IP traceback system to find the real source of attacks, IEEE Trans. Parallel Distrib. Syst. 20 (4) (2009) 567-580.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , Issue.4 , pp. 567-580
    • Xiang, Y.1    Zhou, W.2    Guo, M.3
  • 16
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Y. Xie, S. Yu, Monitoring the application-layer DDoS attacks for popular websites, IEEE/ACM Trans. Netw. 17 (1) (2009) 15-25.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.2
  • 17
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Y. Xie, S. Yu, A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Trans. Netw. 17 (1) (2009) 54-65.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.2
  • 18
    • 84872326429 scopus 로고    scopus 로고
    • An evaluation method of outsourcing services for developing an elastic cloud platform
    • published online
    • W. Dou, L. Qi, X. Zhang, J. Chen, An evaluation method of outsourcing services for developing an elastic cloud platform, J. Supercomput. (2010) http://dx.doi.org/10.1007/s11227-010-0491-2. published online.
    • (2010) J. Supercomput.
    • Dou, W.1    Qi, L.2    Zhang, X.3    Chen, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.