메뉴 건너뛰기




Volumn , Issue , 2014, Pages 604-609

Towards mitigation of low and slow application DDoS attacks

Author keywords

Application Layer; Cloud; Low and Slow Distributed Denial of Service (LSDDoS); Software Defined Network

Indexed keywords

APPLICATION LAYER; APPLICATION PROGRAMS; CLOUDS; NETWORK ARCHITECTURE; NETWORK SECURITY; PERSONAL COMPUTING; SOFTWARE DEFINED NETWORKING;

EID: 84908583823     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IC2E.2014.38     Document Type: Conference Paper
Times cited : (46)

References (29)
  • 1
    • 84908587090 scopus 로고    scopus 로고
    • Arbor Networks, Tech. Rep
    • "Worldwide Infrastructure Security Report," http: //www.arbornetworks.com/dmdocuments/ISR2010 EN.pdf, Arbor Networks, Tech. Rep.
    • Worldwide Infrastructure Security Report1
  • 3
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer ddos attacks for popular websites
    • Y. Xie and S.-Z. Yu, "Monitoring the application-layer ddos attacks for popular websites," Networking, IEEE/AcM Transactions on, vol. 17, no. 1, pp. 15-25, 2009.
    • (2009) Networking, IEEE/AcM Transactions on , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 7
    • 55649105431 scopus 로고    scopus 로고
    • Evaluation of a low-rate dos attack against application servers
    • G. Maci-Fernndez, J. E. Daz-Verdejo, and P. Garca-Teodoro, "Evaluation of a low-rate dos attack against application servers," Computers and Security, vol. 27, no. 78, pp. 335-354, 2008.
    • (2008) Computers and Security , vol.27 , Issue.78 , pp. 335-354
    • Maci-Fernndez, G.1    Daz-Verdejo, J.E.2    Garca-Teodoro, P.3
  • 8
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate tcp-targeted denial of service attacks (the shrew vs the mice and elephants)
    • A. Kuzmanovic and E. W. Knightly, "Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)," in IN PROCEEDINGS OF ACM SIGCOMM, 2003, pp. 75-86.
    • (2003) PROCEEDINGS of ACM SIGCOMM , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 11
    • 84908587087 scopus 로고    scopus 로고
    • [Online]. Available: http://opencontrail.org/
  • 12
    • 84908587086 scopus 로고    scopus 로고
    • "Decoding software defined networking," 2013. [Online]. Available: http://www.juniper.net/us/en/local/pdf/whitepapers/2000510-en.pdf
    • (2013)
    • Decoding software defined networking1
  • 17
    • 84865123155 scopus 로고    scopus 로고
    • Deployment of distributed defense against ddos attacks in isp domain
    • February, published by Foundation of Computer Science.
    • M. Sachdeva, G. Singh, and K. Kumar, "Deployment of Distributed Defense against DDoS Attacks in ISP Domain," International Journal of Computer Applications, vol. 15, no. 2, pp. 25-31, February 2011, published by Foundation of Computer Science.
    • (2011) International Journal of Computer Applications , vol.15 , Issue.2 , pp. 25-31
    • Sachdeva, M.1    Singh, G.2    Kumar, K.3
  • 21
    • 79959394959 scopus 로고    scopus 로고
    • Mitigating denial of service attack using proof of work and Token Bucket Algorithm
    • A. K. Pandey and C. Pandu Rangan, "Mitigating denial of service attack using proof of work and Token Bucket Algorithm," in Proc. IEEE Students' Technology Symp. (TechSym), 2011, pp. 43-47.
    • (2011) Proc. IEEE Students' Technology Symp. (TechSym) , pp. 43-47
    • Pandey, A.K.1    Pandu Rangan, C.2
  • 23
    • 84868336270 scopus 로고    scopus 로고
    • Countermeasures on application level low-rate denial-of-service attack
    • Springer
    • Y. Tang, "Countermeasures on application level low-rate denial-of-service attack," in Information and Communications Security. Springer, 2012, pp. 70-80.
    • (2012) Information and Communications Security , pp. 70-80
    • Tang, Y.1
  • 26
    • 84866758117 scopus 로고    scopus 로고
    • Pattern-based development and management of cloud applications
    • C. Fehling, F. Leymann, J. Rutschlin, and D. Schumm, "Pattern-based development and management of cloud applications," Future Internet, vol. 4, no. 1, pp. 110-141, 2012.
    • (2012) Future Internet , vol.4 , Issue.1 , pp. 110-141
    • Fehling, C.1    Leymann, F.2    Rutschlin, J.3    Schumm, D.4
  • 28
    • 80053169900 scopus 로고    scopus 로고
    • Exploring alternative approaches to implement an elasticity policy
    • H. Ghanbari, B. Simmons, M. Litoiu, and G. Iszlai, "Exploring alternative approaches to implement an elasticity policy," in IEEE CLOUD, 2011, pp. 716-723.
    • (2011) IEEE CLOUD , pp. 716-723
    • Ghanbari, H.1    Simmons, B.2    Litoiu, M.3    Iszlai, G.4
  • 29
    • 84908587085 scopus 로고    scopus 로고
    • [Online]. Available: http://ganglia.sourceforge.net


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.