메뉴 건너뛰기




Volumn 49, Issue 1, 2015, Pages 202-210

Understanding DDoS attack & its effect in cloud environment

Author keywords

Cloud computing; Cloud Security; DDoS

Indexed keywords

CLOUD COMPUTING; NETWORK SECURITY;

EID: 84938911799     PISSN: None     EISSN: 18770509     Source Type: Conference Proceeding    
DOI: 10.1016/j.procs.2015.04.245     Document Type: Conference Paper
Times cited : (120)

References (30)
  • 1
    • 84861307113 scopus 로고    scopus 로고
    • The NIST definition of cloud computing (draft)
    • P. Mell and T. Grance, "The NIST definition of cloud computing (draft)," NIST special publication, vol. 800, no. 145, p. 7, 2011.
    • (2011) NIST Special Publication , vol.800 , Issue.145 , pp. 7
    • Mell, P.1    Grance, T.2
  • 2
    • 85030380990 scopus 로고    scopus 로고
    • Reference-Architecture-Doc-2011-NIST-CloudComputing.pdf.
  • 5
    • 84938947588 scopus 로고    scopus 로고
    • DDoS attack tool timeline, http://staff.washington.edu/dittrich/talks/sec2000/timeline.html
    • DDoS Attack Tool Timeline
  • 6
    • 84938921190 scopus 로고    scopus 로고
    • History of DDoS, http://www.timetoast.com/timelines/history-of-ddos
    • History of DDoS
  • 7
    • 84938932967 scopus 로고    scopus 로고
    • DoS and DDoS Evolution, http://users.atw.hu/denialofservice/ch03lev1sec3.html
    • DoS and DDoS Evolution
  • 8
    • 0041488497 scopus 로고    scopus 로고
    • Feb
    • CERT Coordination Center, Overview of attack trends, Feb. 2002. http://www.cert.org/archive/pdf/attack-trends.pdf.
    • (2002) Overview of Attack Trends
  • 9
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • Mar
    • B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security Privacy, IEEE, vol. 9, no. 2, pp. 5057, Mar. 2011.
    • (2011) Security Privacy, IEEE , vol.9 , Issue.2 , pp. 5057
    • Grobauer, B.1    Walloschek, T.2    Stocker, E.3
  • 11
    • 0013240874 scopus 로고    scopus 로고
    • January 5
    • CERT Advisory CA-1998-01, Smurf IP Denial-of-Service Attacks, January 5, 1998, Available: http://www.cert.org/advisories/CA-1998-01.html
    • (1998) Smurf IP Denial-of-Service Attacks
  • 13
    • 85030380569 scopus 로고    scopus 로고
    • The Notorious Nine, Cloud Computing Top Threats in 2013, https://downloads.cloudsecurityalliance.org/initiatives/topthreats/The Notorious Nine Cloud Computing Top Threatsin 2013.pdf
    • Cloud Computing Top Threats in 2013
  • 15
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • P. Ferguson, D. Senie, Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing, in: RFC 2827, 2001.
    • (2001) RFC , vol.2827
    • Ferguson, P.1    Senie, D.2
  • 16
    • 85030376749 scopus 로고    scopus 로고
    • Global Incident analysis Center Special Notice Egress filtering, Available from http://www.sans.org/y2k/egress.htm.
  • 22
    • 84939607490 scopus 로고    scopus 로고
    • Routing worm: A fast, selective attack worm based on IP address information, 2005
    • C. Zou, D. Towsley, W. Gong, and S. Cai, Routing worm: A fast, selective attack worm based on ip address information, 2005. Common Vulnerabilities and Exposures, http://cve.mitre.org/cve/
    • Common Vulnerabilities and Exposures
    • Zou, C.1    Towsley, D.2    Gong, W.3    Cai, S.4
  • 26
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Washington, DC, August 1317
    • T.M. Gil, M. Poleto, MULTOPS: a data-structure for bandwidth attack detection, in: Proceedings of 10th Usenix Security Symposium, Washington, DC, August 1317, 2001, pp. 2338.
    • (2001) Proceedings of 10th Usenix Security Symposium , pp. 2338
    • Gil, T.M.1    Poleto, M.2
  • 29
    • 0004194675 scopus 로고    scopus 로고
    • Network Working Group, Internet Draft, March, S. Bellovin, The ICMP traceback message, Network from
    • S. Bellovin, The ICMP traceback message, Network Working Group, Internet Draft, March 2000, Available S. Bellovin, The ICMP traceback message, Network from ¡http://lasr.cs.ucla.edu/save/rfc/draft-bellovin-itrace-00.txt¿
    • (2000) The ICMP Traceback Message
    • Bellovin, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.