메뉴 건너뛰기




Volumn 3, Issue 1, 2015, Pages 80-94

Stealthy denial of service strategy in cloud computing

Author keywords

Cloud computing; intrusion detection; low rate attacks; sophisticated attacks strategy

Indexed keywords

CLOUD COMPUTING; COSTS; INTRUSION DETECTION; MAINTENANCE; SECURITY OF DATA; TRANSMISSION CONTROL PROTOCOL;

EID: 84924706348     PISSN: None     EISSN: 21687161     Source Type: Journal    
DOI: 10.1109/TCC.2014.2325045     Document Type: Article
Times cited : (108)

References (41)
  • 4
    • 35549011836 scopus 로고    scopus 로고
    • Robust and efficient detection of DDoS attacks for large-scale internet
    • K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci, "Robust and efficient detection of DDoS attacks for large-scale internet, " Comput. Netw., vol. 51, no. 18, pp. 5036-5056, 2007.
    • (2007) Comput. Netw. , vol.51 , Issue.18 , pp. 5036-5056
    • Lu, K.1    Wu, D.2    Fan, J.3    Todorovic, S.4    Nucci, A.5
  • 5
    • 17744379157 scopus 로고    scopus 로고
    • Defending against low-rate TCP attacks: Dynamic detection and protection
    • H. Sun, J. C. S. Lui, and D. K. Yau, "Defending against low-rate TCP attacks: Dynamic detection and protection, " in Proc. 12th IEEE Int. Conf. Netw. Protocol., 2004, pp. 196-205.
    • (2004) Proc. 12th IEEE Int. Conf. Netw. Protocol. , pp. 196-205
    • Sun, H.1    Lui, J.C.S.2    Yau, D.K.3
  • 9
    • 77249126901 scopus 로고    scopus 로고
    • Thwarting zero-day polymorphic worms with network-level length-based signature generation
    • Feb.
    • L. Wang, Z. Li, Y. Chen, Z. Fu, and X. Li, "Thwarting zero-day polymorphic worms with network-level length-based signature generation, " IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 53-66, Feb. 2010.
    • (2010) IEEE/ACM Trans. Netw. , vol.18 , Issue.1 , pp. 53-66
    • Wang, L.1    Li, Z.2    Chen, Y.3    Fu, Z.4    Li, X.5
  • 10
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks
    • Jul.
    • A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, "Cloud security defense to protect cloud computing against HTTP-DOS and XMLDoS attacks, " J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1097-1107, Jul. 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.4 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Zhou, W.3    Bonti, A.4
  • 12
    • 51449088190 scopus 로고    scopus 로고
    • Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks
    • U. Ben-Porat, A. Bremler-Barr, and H. Levy, "Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks, " in Proc. IEEE Int. Conf. Comput. Commun., 2008, pp. 2297-2305.
    • (2008) Proc. IEEE Int. Conf. Comput. Commun. , pp. 2297-2305
    • Ben-Porat, U.1    Bremler-Barr, A.2    Levy, H.3
  • 15
    • 34247378261 scopus 로고    scopus 로고
    • Improving secure server performance by re-balancing SSL/TLS handshakes
    • Apr.
    • C. Castelluccia, E. Mykletun, and G. Tsudik, "Improving secure server performance by re-balancing SSL/TLS handshakes, " in Proc. ACM Symp. Inf., Apr. 2005, pp. 26-34.
    • (2005) Proc. ACM Symp. Inf. , pp. 26-34
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 18
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks and counter strategies
    • Aug.
    • A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies, " IEEE/ACM Trans. Netw., vol. 14, no. 4, pp. 683-696, Aug. 2006.
    • (2006) IEEE/ACM Trans. Netw. , vol.14 , Issue.4 , pp. 683-696
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 19
    • 25844493118 scopus 로고    scopus 로고
    • TCP vs. TCP: A systematic study of adverse impact of short-lived TCP flows on long lived TCP flows
    • Mar.
    • S. Ebrahimi-Taghizadeh, A. Helmy, and S. Gupta, "TCP vs. TCP: A systematic study of adverse impact of short-lived TCP flows on long lived TCP flows, " in Proc. IEEE Int. Conf. Comput. Commun., Mar. 2005, pp. 926-937.
    • (2005) Proc. IEEE Int. Conf. Comput. Commun. , pp. 926-937
    • Ebrahimi-Taghizadeh, S.1    Helmy, A.2    Gupta, S.3
  • 20
    • 34548297939 scopus 로고    scopus 로고
    • Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs
    • M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs, " in Proc. IEEE Int. Conf. Comput. Commun., 2007, pp. 857-865.
    • (2007) Proc. IEEE Int. Conf. Comput. Commun. , pp. 857-865
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3    Zhang, Y.4
  • 21
    • 77954302312 scopus 로고    scopus 로고
    • Detecting application denial-of-service attacks: A group-testing-based approach
    • Aug.
    • Y. Xuan, I. Shin, M. T. Thai, and T. Znati, "Detecting application denial-of-service attacks: A group-testing-based approach, " IEEE Tran. Parallel Distrib. Syst., vol. 21, no. 8, pp. 1203-1216, Aug. 2010.
    • (2010) IEEE Tran. Parallel Distrib. Syst. , vol.21 , Issue.8 , pp. 1203-1216
    • Xuan, Y.1    Shin, I.2    Thai, M.T.3    Znati, T.4
  • 22
  • 25
    • 84939860310 scopus 로고    scopus 로고
    • On a new class of pulsing denial-of-service attacks and the defense
    • Feb.
    • X. Luo and R. K. Chang, "On a new class of pulsing denial-of-service attacks and the defense, " in Proc. Netw. Distrib. Syst. Security Symp., Feb. 2005, pp. 61-79.
    • (2005) Proc. Netw. Distrib. Syst. Security Symp. , pp. 61-79
    • Luo, X.1    Chang, R.K.2
  • 26
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • Sep.
    • Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis, " J. Parallel Distrib. Comput., vol. 66, no. 9, pp. 1137-1151, Sep. 2006.
    • (2006) J. Parallel Distrib. Comput. , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 27
    • 77955384577 scopus 로고    scopus 로고
    • Real-time detection of stealthy ddos attacks using timeseries decomposition
    • H. Liu. "Real-time detection of stealthy ddos attacks using timeseries decomposition, " in Proc. Int. Conf. Commun., 2010, pp. 1-6.
    • Proc. Int. Conf. Commun. , vol.2010 , pp. 1-6
    • Liu, H.1
  • 30
    • 70350156792 scopus 로고    scopus 로고
    • A survey of attacks on web services
    • M. Jensen, N. Gruschka, and R. Herkenh, "A survey of attacks on web services, " Comput. Sci., vol. 24, no. 4, pp. 185-197, 2009.
    • (2009) Comput. Sci. , vol.24 , Issue.4 , pp. 185-197
    • Jensen, M.1    Gruschka, N.2    Herkenh, R.3
  • 31
    • 84863947150 scopus 로고    scopus 로고
    • Intrusion tolerance of stealth DoS attacks to web services
    • M. Ficco and M. Rak, "Intrusion tolerance of stealth DoS attacks to web services, " in Proc. Int. Conf. Inf. Security Privacy, 2012, vol. 376, pp. 579-584.
    • (2012) Proc. Int. Conf. Inf. Security Privacy , vol.376 , pp. 579-584
    • Ficco, M.1    Rak, M.2
  • 32
    • 81255200367 scopus 로고    scopus 로고
    • Intrusion tolerant approach for denial of service attacks to web services
    • Jun.
    • M. Ficco and M. Rak, "Intrusion tolerant approach for denial of service attacks to web services, " in Proc. IEEE Int. Conf. Data Compression, Commun. Process., Jun. 2011, pp. 285-292.
    • (2011) Proc. IEEE Int. Conf. Data Compression, Commun. Process. , pp. 285-292
    • Ficco, M.1    Rak, M.2
  • 33
    • 84924703974 scopus 로고    scopus 로고
    • TPC Benchmark W (TPC-W)
    • TPC Benchmark W (TPC-W). A transactional web benchmark. (2013) [Online]. Available: at http://www.tpc.org/tpcw/
    • (2013) A Transactional Web Benchmark
  • 36
    • 84875043225 scopus 로고    scopus 로고
    • Performance analysis of network I/O workloads in virtualized data centers
    • Jan.
    • Y. Mei, L. Liu, and X. Pu, "Performance analysis of network I/O workloads in virtualized data centers, " IEEE Trans. Services Comput., vol. 6, no. 1, pp. 48-63, Jan. 2013.
    • (2013) IEEE Trans. Services Comput. , vol.6 , Issue.1 , pp. 48-63
    • Mei, Y.1    Liu, L.2    Pu, X.3
  • 38
    • 84891779173 scopus 로고    scopus 로고
    • A self-optimizing workload management solution for cloud applications
    • H. Wu, A. N. Tantawi, and T. Yu, "A self-optimizing workload management solution for cloud applications, " in Proc. IEEE 20th Int. Conf. Web Serv., 2013, pp. 483-490.
    • (2013) Proc. IEEE 20th Int. Conf. Web Serv. , pp. 483-490
    • Wu, H.1    Tantawi, A.N.2    Yu, T.3
  • 39
    • 77952771893 scopus 로고    scopus 로고
    • Monitoring continuous state violation in datacenters: Exploring the time dimension
    • S. Meng, T. Wang, and L. Liu, "Monitoring continuous state violation in datacenters: Exploring the time dimension, " in Proc. IEEE 26th Int. Conf. Data Eng., 2010, pp. 968-979.
    • (2010) Proc. IEEE 26th Int. Conf. Data Eng. , pp. 968-979
    • Meng, S.1    Wang, T.2    Liu, L.3
  • 40
    • 84880300768 scopus 로고    scopus 로고
    • Jan.
    • Auto Scaling in the Amazon Cloud. (2012, Jan.) [Online]. Available: http://techblog.netflix.com/2012/01/auto-scalingin-amazoncloud. html
    • (2012) Auto Scaling in the Amazon Cloud
  • 41
    • 84882403734 scopus 로고    scopus 로고
    • Security event correlation approach for cloud computing
    • M. Ficco, "Security event correlation approach for cloud computing, " Int. J. High Perform. Comput. Netw., vol. 7, no. 3, pp. 173-185, 2013.
    • (2013) Int. J. High Perform. Comput. Netw. , vol.7 , Issue.3 , pp. 173-185
    • Ficco, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.