-
1
-
-
84861307113
-
The NIST definition of cloud computing (draft)
-
P. Mell and T. Grance, "The NIST definition of cloud computing (draft)," NIST special publication, vol. 800, no. 145, p. 7, 2011.
-
(2011)
NIST Special Publication
, vol.800
, Issue.145
, pp. 7
-
-
Mell, P.1
Grance, T.2
-
2
-
-
85030380990
-
-
Reference-Architecture-Doc-2011-NIST-CloudComputing.pdf.
-
-
-
-
3
-
-
77954322780
-
Cloud computing: Issues and challenges
-
T. Dillon, C. Wu, and E. Chang, "Cloud Computing: Issues and Challenges," in 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2010, pp. 2733.
-
(2010)
24th IEEE International Conference on Advanced Information Networking and Applications (AINA)
, pp. 2733
-
-
Dillon, T.1
Wu, C.2
Chang, E.3
-
5
-
-
84938947588
-
-
DDoS attack tool timeline, http://staff.washington.edu/dittrich/talks/sec2000/timeline.html
-
DDoS Attack Tool Timeline
-
-
-
6
-
-
84938921190
-
-
History of DDoS, http://www.timetoast.com/timelines/history-of-ddos
-
History of DDoS
-
-
-
7
-
-
84938932967
-
-
DoS and DDoS Evolution, http://users.atw.hu/denialofservice/ch03lev1sec3.html
-
DoS and DDoS Evolution
-
-
-
8
-
-
0041488497
-
-
Feb
-
CERT Coordination Center, Overview of attack trends, Feb. 2002. http://www.cert.org/archive/pdf/attack-trends.pdf.
-
(2002)
Overview of Attack Trends
-
-
-
9
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
Mar
-
B. Grobauer, T. Walloschek, and E. Stocker, "Understanding Cloud Computing Vulnerabilities," Security Privacy, IEEE, vol. 9, no. 2, pp. 5057, Mar. 2011.
-
(2011)
Security Privacy, IEEE
, vol.9
, Issue.2
, pp. 5057
-
-
Grobauer, B.1
Walloschek, T.2
Stocker, E.3
-
10
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
April
-
C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: Classification and state-of-the-art, Computer Networks: the Int. J. Computer and Telecommunications Networking, Vol. 44, No. 5, April 2004, pp. 643666.
-
(2004)
Computer Networks: The Int. J. Computer and Telecommunications Networking
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
11
-
-
0013240874
-
-
January 5
-
CERT Advisory CA-1998-01, Smurf IP Denial-of-Service Attacks, January 5, 1998, Available: http://www.cert.org/advisories/CA-1998-01.html
-
(1998)
Smurf IP Denial-of-Service Attacks
-
-
-
13
-
-
85030380569
-
-
The Notorious Nine, Cloud Computing Top Threats in 2013, https://downloads.cloudsecurityalliance.org/initiatives/topthreats/The Notorious Nine Cloud Computing Top Threatsin 2013.pdf
-
Cloud Computing Top Threats in 2013
-
-
-
14
-
-
84903755100
-
Honeypots for distributed denial of service
-
Pitsburgh, PA, USA, June
-
N. Weiler, Honeypots for Distributed Denial of Service, in Proceedings ofthe Eleventh IEEE International Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises 2002, Pitsburgh, PA, USA, June 2002, pp. 109114.
-
(2002)
Proceedings Ofthe Eleventh IEEE International Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises 2002
, pp. 109-114
-
-
Weiler, N.1
-
15
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
P. Ferguson, D. Senie, Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing, in: RFC 2827, 2001.
-
(2001)
RFC
, vol.2827
-
-
Ferguson, P.1
Senie, D.2
-
16
-
-
85030376749
-
-
Global Incident analysis Center Special Notice Egress filtering, Available from http://www.sans.org/y2k/egress.htm.
-
-
-
-
17
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power law internets
-
ACM Press, New York
-
K. Park, H. Lee, On the effectiveness of route-based packet filtering for Distributed DoS attack prevention in power law Internets, in: Proceedings of the ACM SIGCOMM 01 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, New York, 2001, pp. 1526.
-
(2001)
Proceedings of the ACM SIGCOMM 01 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
18
-
-
21244469720
-
SoS: Secure overlay services
-
ACM Press, New York
-
A. Keromytis, V. Misra, D. Rubenstein, SoS: secure overlay services, in: Proceedings of the ACM SIGCOMM 02 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, New York, 2002, pp. 6172
-
(2002)
Proceedings of the ACM SIGCOMM 02 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 6172
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
-
22
-
-
84939607490
-
Routing worm: A fast, selective attack worm based on IP address information, 2005
-
C. Zou, D. Towsley, W. Gong, and S. Cai, Routing worm: A fast, selective attack worm based on ip address information, 2005. Common Vulnerabilities and Exposures, http://cve.mitre.org/cve/
-
Common Vulnerabilities and Exposures
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
23
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France
-
J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in: Proceedings of ICNP 2002, Paris, France, 2002, pp. 312321
-
(2002)
Proceedings of ICNP 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
26
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
Washington, DC, August 1317
-
T.M. Gil, M. Poleto, MULTOPS: a data-structure for bandwidth attack detection, in: Proceedings of 10th Usenix Security Symposium, Washington, DC, August 1317, 2001, pp. 2338.
-
(2001)
Proceedings of 10th Usenix Security Symposium
, pp. 2338
-
-
Gil, T.M.1
Poleto, M.2
-
27
-
-
0035361712
-
Network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Network support for IP traceback, IEEE/ACM Transaction on Networking 9 (3) (2001) 226237.
-
(2001)
IEEE/ACM Transaction on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
29
-
-
0004194675
-
-
Network Working Group, Internet Draft, March, S. Bellovin, The ICMP traceback message, Network from
-
S. Bellovin, The ICMP traceback message, Network Working Group, Internet Draft, March 2000, Available S. Bellovin, The ICMP traceback message, Network from ¡http://lasr.cs.ucla.edu/save/rfc/draft-bellovin-itrace-00.txt¿
-
(2000)
The ICMP Traceback Message
-
-
Bellovin, S.1
|