-
1
-
-
84908587090
-
-
Arbor Networks, Tech. Rep
-
"Worldwide Infrastructure Security Report," http: //www.arbornetworks.com/dmdocuments/ISR2010 EN.pdf, Arbor Networks, Tech. Rep.
-
-
-
Worldwide Infrastructure Security Report1
-
2
-
-
84875784364
-
A novel ddos attack detection method
-
J. Zhu, F. Fu, K. Yin, H. Li, and Y. Liu, "A novel ddos attack detection method," Journal of Computational Information Systems, vol. 9, no. 2, pp. 549-556, 2013.
-
(2013)
Journal of Computational Information Systems
, vol.9
, Issue.2
, pp. 549-556
-
-
Zhu, J.1
Fu, F.2
Yin, K.3
Li, H.4
Liu, Y.5
-
3
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
Y. Xie and S.-Z. Yu, "Monitoring the application-layer ddos attacks for popular websites," Networking, IEEE/AcM Transactions on, vol. 17, no. 1, pp. 15-25, 2009.
-
(2009)
Networking, IEEE/AcM Transactions on
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
6
-
-
84867065003
-
Ddos attacks defense system using information metrics
-
Springer
-
P. Senthilmahesh, S. Hemalatha, P. Rodrigues, and A. Shanthakumari, "Ddos attacks defense system using information metrics," in Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing. Springer, 2013, pp. 25-30.
-
(2013)
Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing
, pp. 25-30
-
-
Senthilmahesh, P.1
Hemalatha, S.2
Rodrigues, P.3
Shanthakumari, A.4
-
7
-
-
55649105431
-
Evaluation of a low-rate dos attack against application servers
-
G. Maci-Fernndez, J. E. Daz-Verdejo, and P. Garca-Teodoro, "Evaluation of a low-rate dos attack against application servers," Computers and Security, vol. 27, no. 78, pp. 335-354, 2008.
-
(2008)
Computers and Security
, vol.27
, Issue.78
, pp. 335-354
-
-
Maci-Fernndez, G.1
Daz-Verdejo, J.E.2
Garca-Teodoro, P.3
-
8
-
-
1242287727
-
Low-rate tcp-targeted denial of service attacks (the shrew vs the mice and elephants)
-
A. Kuzmanovic and E. W. Knightly, "Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)," in IN PROCEEDINGS OF ACM SIGCOMM, 2003, pp. 75-86.
-
(2003)
PROCEEDINGS of ACM SIGCOMM
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
9
-
-
84883815094
-
A study on lowrate ddos attacks in real networks
-
IEEE
-
J.-S. Yang, M.-W. Park, and T.-M. Chung, "A study on lowrate ddos attacks in real networks," in Information Science and Applications (ICISA), 2013 International Conference on. IEEE, 2013, pp. 1-4.
-
(2013)
Information Science and Applications (ICISA), 2013 International Conference on
, pp. 1-4
-
-
Yang, J.-S.1
Park, M.-W.2
Chung, T.-M.3
-
10
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "Openflow: enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
11
-
-
84908587087
-
-
[Online]. Available: http://opencontrail.org/
-
-
-
-
12
-
-
84908587086
-
-
"Decoding software defined networking," 2013. [Online]. Available: http://www.juniper.net/us/en/local/pdf/whitepapers/2000510-en.pdf
-
(2013)
-
-
Decoding software defined networking1
-
13
-
-
84865143184
-
Model-based adaptive dos attack mitigation
-
C. Barna, M. Shtern, M. Smit, V. Tzerpos, and M. Litoiu, "Model-based adaptive dos attack mitigation," in Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop on. IEEE, 2012, pp. 119-128.
-
(2012)
Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop On. IEEE
, pp. 119-128
-
-
Barna, C.1
Shtern, M.2
Smit, M.3
Tzerpos, V.4
Litoiu, M.5
-
17
-
-
84865123155
-
Deployment of distributed defense against ddos attacks in isp domain
-
February, published by Foundation of Computer Science.
-
M. Sachdeva, G. Singh, and K. Kumar, "Deployment of Distributed Defense against DDoS Attacks in ISP Domain," International Journal of Computer Applications, vol. 15, no. 2, pp. 25-31, February 2011, published by Foundation of Computer Science.
-
(2011)
International Journal of Computer Applications
, vol.15
, Issue.2
, pp. 25-31
-
-
Sachdeva, M.1
Singh, G.2
Kumar, K.3
-
18
-
-
82955168401
-
Distributed defense of distributed DoS using pushback and communicate mechanism
-
T. H. Nguyen, C. T. Doan, V. Q. Nguyen, T. H. T. Nguyen, and M. P. Doan, "Distributed defense of distributed DoS using pushback and communicate mechanism," in Proc. Int Advanced Technologies for Communications (ATC) Conf, 2011, pp. 178-182.
-
(2011)
Proc. Int Advanced Technologies for Communications (ATC) Conf
, pp. 178-182
-
-
Nguyen, T.H.1
Doan, C.T.2
Nguyen, V.Q.3
Nguyen, T.H.T.4
Doan, M.P.5
-
19
-
-
84893960790
-
Proactive server roaming for mitigating denialof-service attacks
-
S. M. Khattab, C. Sangpachatanaruk, R. Melhem, D. l Mosse, and T. Znati, "Proactive server roaming for mitigating denialof-service attacks," in Proc. ITRE2003 Information Technology: Research and Education Int. Conf, 2003, pp. 286-290.
-
(2003)
Proc. ITRE2003 Information Technology: Research and Education Int. Conf
, pp. 286-290
-
-
Khattab, S.M.1
Sangpachatanaruk, C.2
Melhem, R.3
Mosse, D.L.4
Znati, T.5
-
20
-
-
20544444867
-
Mitigating performance degradation of network-based control systems under denial of service attacks
-
L. M., W. C.-H. J., J. Y. Hung, and I. J. D., "Mitigating performance degradation of network-based control systems under denial of service attacks," in Proc. 30th Annual Conf. of IEEE Industrial Electronics Society IECON 2004, vol. 3, 2004, pp. 2339-2342.
-
(2004)
Proc. 30th Annual Conf. of IEEE Industrial Electronics Society IECON 2004
, vol.3
, pp. 2339-2342
-
-
Me, L.1
Jo, W.C.-H.2
Hung, J.Y.3
Du, I.J.4
-
22
-
-
79955041204
-
Lightweight ddos flooding attack detection using nox/openflow
-
R. Braga, E. Mota, and A. Passito, "Lightweight ddos flooding attack detection using nox/openflow," in Local Computer Networks (LCN), 2010 IEEE 35th Conference on, 2010, pp. 408-415.
-
(2010)
Local Computer Networks (LCN) 2010 IEEE 35th Conference on
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
23
-
-
84868336270
-
Countermeasures on application level low-rate denial-of-service attack
-
Springer
-
Y. Tang, "Countermeasures on application level low-rate denial-of-service attack," in Information and Communications Security. Springer, 2012, pp. 70-80.
-
(2012)
Information and Communications Security
, pp. 70-80
-
-
Tang, Y.1
-
24
-
-
84872093523
-
An architecture for overlaying private clouds on public providers
-
IEEE
-
M. Shtern, B. Simmons, M. Smit, and M. Litoiu, "An architecture for overlaying private clouds on public providers," in Network and Service Management (CNSM), 2012 8th International Conference on. IEEE, 2012, pp. 371-377.
-
(2012)
Network and Service Management (CNSM), 2012 8th International Conference on
, pp. 371-377
-
-
Shtern, M.1
Simmons, B.2
Smit, M.3
Litoiu, M.4
-
25
-
-
84883480316
-
Navigating the clouds with a map
-
-, "Navigating the clouds with a map," in Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on, 2013, pp. 464-470.
-
(2013)
Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on
, pp. 464-470
-
-
Shtern, M.1
Simmons, B.2
Smit, M.3
Litoiu, M.4
-
26
-
-
84866758117
-
Pattern-based development and management of cloud applications
-
C. Fehling, F. Leymann, J. Rutschlin, and D. Schumm, "Pattern-based development and management of cloud applications," Future Internet, vol. 4, no. 1, pp. 110-141, 2012.
-
(2012)
Future Internet
, vol.4
, Issue.1
, pp. 110-141
-
-
Fehling, C.1
Leymann, F.2
Rutschlin, J.3
Schumm, D.4
-
27
-
-
84888038703
-
Pattern-based deployment service for next generation clouds
-
H. Lu, M. Shtern, B. Simmons, M. Smit, and M. Litoiu, "Pattern-based deployment service for next generation clouds," in Services (SERVICES), 203 IEEE Ninth World Congress on, 2013, pp. 464-471.
-
(2013)
Services (SERVICES), 203 IEEE Ninth World Congress on
, pp. 464-471
-
-
Lu, H.1
Shtern, M.2
Simmons, B.3
Smit, M.4
Litoiu, M.5
-
28
-
-
80053169900
-
Exploring alternative approaches to implement an elasticity policy
-
H. Ghanbari, B. Simmons, M. Litoiu, and G. Iszlai, "Exploring alternative approaches to implement an elasticity policy," in IEEE CLOUD, 2011, pp. 716-723.
-
(2011)
IEEE CLOUD
, pp. 716-723
-
-
Ghanbari, H.1
Simmons, B.2
Litoiu, M.3
Iszlai, G.4
-
29
-
-
84908587085
-
-
[Online]. Available: http://ganglia.sourceforge.net
-
-
-
|