메뉴 건너뛰기




Volumn 18, Issue 9, 2014, Pages 1697-1703

A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment

Author keywords

Cloud computing; DDoS attack detection; HTTP packet pattern; MapReduce

Indexed keywords

CLOUD COMPUTING; GRID COMPUTING; HTTP; INFRASTRUCTURE AS A SERVICE (IAAS); NETWORK SECURITY; PLATFORM AS A SERVICE (PAAS); SOFTWARE AS A SERVICE (SAAS); WEB SERVICES;

EID: 84905744352     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-014-1250-8     Document Type: Article
Times cited : (94)

References (15)
  • 2
    • 4444317270 scopus 로고    scopus 로고
    • Defending Against an Internet-Based Attack on the Physical World
    • Byers S, Robin AD, Kormann D (2004) Defending Against an Internet-Based Attack on the Physical World. ACM Trans Internet Technol 4(3): 239-254.
    • (2004) ACM Trans Internet Technol , vol.4 , Issue.3 , pp. 239-254
    • Byers, S.1    Robin, A.D.2    Kormann, D.3
  • 4
    • 84897968877 scopus 로고    scopus 로고
    • Intelligent reconfigurable method of cloud computing resources for multimedia data delivery
    • Choi J, Choi C, Yim K, Kim J, Kim P (2013) Intelligent reconfigurable method of cloud computing resources for multimedia data delivery. Informatica 24(3): 381-394.
    • (2013) Informatica , vol.24 , Issue.3 , pp. 381-394
    • Choi, J.1    Choi, C.2    Yim, K.3    Kim, J.4    Kim, P.5
  • 6
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the Internet
    • Garber L (2000) Denial-of-service attacks rip the Internet. IEEE Comput 33(4): 12-17.
    • (2000) IEEE Comput , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 7
    • 84892669628 scopus 로고    scopus 로고
    • IT2FS-based ontology with soft-computing mechanism for malware behavior analysis
    • Huang HD, Lee CS, Wang MH, Kao HY (2014) IT2FS-based ontology with soft-computing mechanism for malware behavior analysis. Soft Comput 18(2): 267-284.
    • (2014) Soft Comput , vol.18 , Issue.2 , pp. 267-284
    • Huang, H.D.1    Lee, C.S.2    Wang, M.H.3    Kao, H.Y.4
  • 9
    • 56349085999 scopus 로고    scopus 로고
    • Google's MapReduce programming model-Revisited
    • Lammel R (2008) Google's MapReduce programming model-Revisited. Sci Comput Program 70(1): 1-30.
    • (2008) Sci Comput Program , vol.70 , Issue.1 , pp. 1-30
    • Lammel, R.1
  • 10
    • 84875670442 scopus 로고    scopus 로고
    • Preserving quality of service for normal users against DDoS attacks by using double check priority queues
    • Lin CH, Lin HY, Wu TW, Chen YH, Huang CH (2013) Preserving quality of service for normal users against DDoS attacks by using double check priority queues. J Ambient Intell Humaniz Comput 4(2): 1-8.
    • (2013) J Ambient Intell Humaniz Comput , vol.4 , Issue.2 , pp. 1-8
    • Lin, C.H.1    Lin, H.Y.2    Wu, T.W.3    Chen, Y.H.4    Huang, C.H.5
  • 12
    • 40649126581 scopus 로고    scopus 로고
    • Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
    • Noh S, Jung G, Choi K, Lee C (2008) Compiling network traffic into rules using soft computing methods for the detection of flooding attacks. Appl Soft Comput 8(3): 1200-1210.
    • (2008) Appl Soft Comput , vol.8 , Issue.3 , pp. 1200-1210
    • Noh, S.1    Jung, G.2    Choi, K.3    Lee, C.4
  • 15
    • 78651487216 scopus 로고    scopus 로고
    • An intelligent decision-making system for flood monitoring from space
    • Vladimirova T, Yuhaniz S (2011) An intelligent decision-making system for flood monitoring from space. Soft Comput 15(1): 13-24.
    • (2011) Soft Comput , vol.15 , Issue.1 , pp. 13-24
    • Vladimirova, T.1    Yuhaniz, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.