메뉴 건너뛰기




Volumn 11, Issue 3, 2013, Pages 262-279

Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP

Author keywords

Cloud; DDoS attack; Flooding; Spoofed IP

Indexed keywords

CLOUD COMPUTING; CLOUDS; COST EFFECTIVENESS; FLOODS; INTERNET PROTOCOLS; NETWORK SECURITY; OIL WELL FLOODING;

EID: 84894477998     PISSN: 17543916     EISSN: 17543924     Source Type: Journal    
DOI: 10.1504/IJCNDS.2013.056223     Document Type: Article
Times cited : (22)

References (17)
  • 3
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    • Chonka, A., Xiang, Y., Zhou, W. and Bonti, A. (2010) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of Network and Computer Applications, Vol. 34, No. 1, pp.1097-1107.
    • (2010) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Zhou, W.3    Bonti, A.4
  • 8
    • 79951783095 scopus 로고    scopus 로고
    • Analysis on cloud-based security vulnerability assessment
    • Li, H-C. and Liang, P-H. (2010) Analysis on cloud-based security vulnerability assessment, IEEE International Conference, pp.490-494.
    • (2010) IEEE International Conference , pp. 490-494
    • Li, H.-C.1    Liang, P.-H.2
  • 11
    • 85060978839 scopus 로고    scopus 로고
    • Improving network performance and mitigate DDoS attacks using analytical approach under collaborative software as a service (SaaS) cloud computing environment
    • Mann, P.S. and Kumar, D. (2010) Improving network performance and mitigate DDoS attacks using analytical approach under collaborative software as a service (SaaS) cloud computing environment, International Journal of Computer Science and Technology, Vol. 2, No. 1, pp.119-122.
    • (2010) International Journal of Computer Science and Technology , vol.2 , Issue.1 , pp. 119-122
    • Mann, P.S.1    Kumar, D.2
  • 12
    • 71449091186 scopus 로고    scopus 로고
    • Block spoofed packets at source (BSPS): A method for detecting and preventing all types of spoofed source IP packets and SYN flooding packets at source: A theoretical framework
    • Noureldien, N.A. and Hussein, M.O. (2009) Block spoofed packets at source (BSPS): a method for detecting and preventing all types of spoofed source IP packets and SYN flooding packets at source: a theoretical framework, Second International Conference on the Applications of Digital Information and Web Technologies, pp.579-583.
    • (2009) Second International Conference on the Applications of Digital Information and Web Technologies , pp. 579-583
    • Noureldien, N.A.1    Hussein, M.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.