-
1
-
-
85031391396
-
-
Mathew Prince (2013) The DDoS That Knoked Spamhaus Offline (And How We Mitigated It). CloudFlare Blog [Online] Available from:. Accessed on Sept 2014
-
Mathew Prince (2013) The DDoS That Knoked Spamhaus Offline (And How We Mitigated It). CloudFlare Blog [Online] Available from: http://blog.Cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho/. Accessed on Sept 2014
-
-
-
-
2
-
-
84894646147
-
Network anomaly detection: methods, systems and tools
-
Bhuyan MH et al (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surveys Tutor 16(1):303–336
-
(2014)
IEEE Commun Surveys Tutor
, vol.16
, Issue.1
, pp. 303-336
-
-
Bhuyan, M.H.1
-
4
-
-
70350422660
-
Chaos theory based detection against network mimicking DDoS attacks
-
Chonka Ashley, Singh Jaipal, Zhou Wanlei (2009) Chaos theory based detection against network mimicking DDoS attacks. Commun Lett IEEE 13(9):717–719
-
(2009)
Commun Lett IEEE
, vol.13
, Issue.9
, pp. 717-719
-
-
Chonka, A.1
Singh, J.2
Zhou, W.3
-
5
-
-
84878708621
-
DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory
-
Chen Yonghong, Ma Xinlei, Xinya Wu (2013) DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory. Commun Lett IEEE 17(5):1052–1054
-
(2013)
Commun Lett IEEE
, vol.17
, Issue.5
, pp. 1052-1054
-
-
Chen, Y.1
Ma, X.2
Xinya, W.3
-
6
-
-
33646516485
-
Possible generalization of Boltzmann-Gibbs statistics
-
Tsallis C (1988) Possible generalization of Boltzmann-Gibbs statistics. J Stat Phys 52(1–2):479–487
-
(1988)
J Stat Phys
, vol.52
, Issue.1-2
, pp. 479-487
-
-
Tsallis, C.1
-
7
-
-
84893749338
-
DDoS detection method based on chaos analysis of network traffic entropy
-
Ma Xinlei, Chen Yonghong (2014) DDoS detection method based on chaos analysis of network traffic entropy. IEEE Commun Lett 18(1):114–117
-
(2014)
IEEE Commun Lett
, vol.18
, Issue.1
, pp. 114-117
-
-
Ma, X.1
Chen, Y.2
-
8
-
-
84892597103
-
Validation of chaos hypothesis in NADA and improved DDoS detection algorithm
-
Wu Xinya, Chen Yonghong (2013) Validation of chaos hypothesis in NADA and improved DDoS detection algorithm. Commun Lett IEEE 17(12):2396–2399
-
(2013)
Commun Lett IEEE
, vol.17
, Issue.12
, pp. 2396-2399
-
-
Wu, X.1
Chen, Y.2
-
9
-
-
33646742035
-
PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Kim Y, Lau WC, Chuah MC, Chao HJ (2006) PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans Dependable Secur Comput 3(2):141–155
-
(2006)
IEEE Trans Dependable Secur Comput
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
10
-
-
85031394554
-
Detecting and tracing DDoS attacks by intelligent decision prototype. Pervasive computing and communications, 2008
-
Chonka A et al (2008) Detecting and tracing DDoS attacks by intelligent decision prototype. Pervasive computing and communications, 2008, Sixth annual IEEE international conference on
-
(2008)
Sixth annual IEEE international conference on
-
-
Chonka, A.1
-
11
-
-
0001647024
-
Practical network support for IP traceback. SIGCOMM’00, Stockholm
-
Savage S, Wetherall D, Karlin A, Anderson T (2001) Practical network support for IP traceback. SIGCOMM’00, Stockholm, Sweden, 2000
-
(2001)
Sweden
, pp. 2000
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
12
-
-
0142199483
-
Tracing multiple attackers with deterministic packet marking (DPM)
-
Belenky A, Ansari N (2003) Tracing multiple attackers with deterministic packet marking (DPM). In: Proceedings of IEEE Pacific rim conference on communications, computers and signal processing, 2003, PACRIM, vol. 1, p. 49–52
-
(2003)
Proceedings of IEEE Pacific rim conference on communications, computers and signal processing, 2003, PACRIM
, vol.1
, pp. 49-52
-
-
Belenky, A.1
Ansari, N.2
-
13
-
-
51849137884
-
Protecting web services with service oriented traceback architecture. Computer and information technology, 2008
-
Chonka A, Wanlei Z, Yang X (2008) Protecting web services with service oriented traceback architecture. Computer and information technology, 2008, CIT 2008, 8th IEEE international conference on, 2008
-
(2008)
CIT 2008, 8th IEEE international conference on
, pp. 2008
-
-
Chonka, A.1
Wanlei, Z.2
Yang, X.3
-
14
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
Elsevier
-
Chonka et al (2010) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl 34(4):1097–1107 (Elsevier)
-
(2010)
J Netw Comput Appl
, vol.34
, Issue.4
, pp. 1097-1107
-
-
Chonka1
-
15
-
-
85031392828
-
-
Ko R, Lee SSG (2013) Cloud computing vulnerability incidents: a statistical overview [Online] Available from:. Accessed on Sept 2014
-
Ko R, Lee SSG (2013) Cloud computing vulnerability incidents: a statistical overview [Online] Available from: https://downloads.Cloudsecurityalliance.org/initiatives/cvwg/CSA_Whitepaper_Cloud_Computing_Vulnerability_Incidents.zip. Accessed on Sept 2014
-
-
-
-
16
-
-
85031392787
-
-
Arbor Networks, Inc (2014) Worldwide infrastructure security report volume IX [Online]. Available from: [Accessed on Sept. 2014]
-
Arbor Networks, Inc (2014) Worldwide infrastructure security report volume IX [Online]. Available from: http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf [Accessed on Sept. 2014]
-
-
-
-
17
-
-
85031392747
-
-
Incapsula Inc. (2014) 2013–2014 DoS threat landscape report [Online]. Available from:. Accessed on Sept 2014
-
Incapsula Inc. (2014) 2013–2014 DoS threat landscape report [Online]. Available from: http://www.incapsula.com/blog/ddos-threat-landscape-report-2014.html. Accessed on Sept 2014
-
-
-
-
19
-
-
85031392471
-
-
Google App Engine, Google Inc.,. Accessed on Sept 2014
-
Google App Engine, Google Inc., http://Cloud.google.com/appengine. Accessed on Sept 2014
-
-
-
-
20
-
-
85031392273
-
-
Azure: Microsoft’s Cloud Platform, Microsoft Corporation,. Accessed on Sept 2014
-
Azure: Microsoft’s Cloud Platform, Microsoft Corporation, http://azure.microsoft.com/en-us/. Accessed on Sept 2014
-
-
-
-
21
-
-
85031393338
-
-
Amazon Elastic Compute Cloud (Amazon EC2), Amazon, Amazon. Accessed on Sept 2014
-
Amazon Elastic Compute Cloud (Amazon EC2), Amazon, http://aws.amazon.com/ec2/, Amazon. Accessed on Sept 2014
-
-
-
-
22
-
-
85031392525
-
-
IBM Cloud Computing, IBM,. Accessed on Sept 2014
-
IBM Cloud Computing, IBM, http://www.ibm.com/Cloud-computing/in/en/. Accessed on Sept 2014
-
-
-
-
23
-
-
85031391870
-
-
Amazon VPC, Amazon,. Accessed on Sept 2014
-
Amazon VPC, Amazon, http://aws.amazon.com/vpc/. Accessed on Sept 2014
-
-
-
-
24
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini Subashini, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
25
-
-
85031394796
-
-
Gartner: Seven Cloud Computing Security Risks, Networkworld,. Accessed on Sept 2014
-
Gartner: Seven Cloud Computing Security Risks, Networkworld, http://www.networkworld.com/article/2281535/data-center/gartner–seven-Cloud-computing-security-risks.html. Accessed on Sept 2014
-
-
-
-
26
-
-
84897106892
-
Security issues in cloud environments: a survey
-
Fernandes DAB et al (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170
-
(2014)
Int J Inf Secur
, vol.13
, Issue.2
, pp. 113-170
-
-
Fernandes, D.A.B.1
-
27
-
-
84857170570
-
Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation
-
Behl A (2011) Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation. In: Information and communication technologies (WICT), 2011 world congress on, p. 217–222, 2011
-
(2011)
Information and communication technologies (WICT), 2011 world congress on, p
, vol.217-222
, pp. 2011
-
-
Behl, A.1
-
29
-
-
84873369523
-
Using Cloud computing to implement a security overlay network
-
Salah K, Calero JA (2013) Using Cloud computing to implement a security overlay network. IEEE Secur Privacy 11(1):44–53
-
(2013)
IEEE Secur Privacy
, vol.11
, Issue.1
, pp. 44-53
-
-
Salah, K.1
Calero, J.A.2
-
31
-
-
78650154288
-
A new form of DOS attack in a cloud and its avoidance mechanism
-
ACM workshop on cloud computing security workshop, ACM
-
Liu, H (2010) A new form of DOS attack in a cloud and its avoidance mechanism. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop, ACM, 2010
-
(2010)
Proceedings of the
, vol.2010
, pp. 2010
-
-
Liu, H.1
-
32
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Trans Intern Comput 10(1):82–89
-
(2006)
IEEE Trans Intern Comput
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
33
-
-
85031393756
-
-
Hackers break into server for Obamacare website: U.S. officials, Reuters, 2014. Accessed on Sept 2014
-
Hackers break into server for Obamacare website: U.S. officials, Reuters, 2014 http://www.reuters.com/article/2014/09/04/us-usa-healthcare-cybersecurity-idUSKBN0GZ2RF20140904. Accessed on Sept 2014
-
-
-
-
34
-
-
85031392577
-
-
CERT Advisory, CA-1996-01, Carnegie Mellon University, 2014,. Accessed on Sept 2014
-
CERT Advisory, CA-1996-01, Carnegie Mellon University, 2014, http://www.cert.org/historical/advisories/CA-1996-01.cfm. Accessed on Sept 2014
-
-
-
-
35
-
-
85031392755
-
-
DDoS Attack Types and Mitigation Methods, IncapsulaInc, 2014,. Accessed on Sept 2014
-
DDoS Attack Types and Mitigation Methods, IncapsulaInc, 2014, http://www.incapsula.com/ddos/ddos-attacks/. Accessed on Sept 2014
-
-
-
-
36
-
-
85031393694
-
-
DoS Attacks and Free DoS Attacking Tools, Infosec Institute, 2014,. Accessed on Sept 2014
-
DoS Attacks and Free DoS Attacking Tools, Infosec Institute, 2014, http://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/. Accessed on Sept 2014
-
-
-
-
37
-
-
85031392284
-
-
CERT Advisory CA-1997-28, Carnegie Mellon University, 2014,. Accessed on Sept 2014
-
CERT Advisory CA-1997-28, Carnegie Mellon University, 2014, http://www.cert.org/historical/advisories/ca-1997-28.cfm. Accessed on Sept 2014
-
-
-
-
38
-
-
85031391938
-
-
CERT Advisory CA-1996-21, Carnegie Mellon University, 2014. Accessed on Sept 2014
-
CERT Advisory CA-1996-21, Carnegie Mellon University, 2014 http://www.cert.org/historical/advisories/ca-1996-21.cfm. Accessed on Sept 2014
-
-
-
-
39
-
-
85031392713
-
-
The NSL-KDD Dataset,. Accessed 18 Mar 2016
-
The NSL-KDD Dataset, http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDD-dataset.html. Accessed 18 Mar 2016
-
-
-
-
40
-
-
85031394800
-
Extended independent comparison of popular deep packet inspection (DPI) Tools for Traffic Classification, [Online]
-
Bujlow T, Carela-Español V, Barlet-Ros P (2014) Extended independent comparison of popular deep packet inspection (DPI) Tools for Traffic Classification, [Online]. Available from: http://vbn.aau.dk/files/179043085/TBU_Extended_dpi_report.pdf
-
(2014)
Available from:
-
-
Bujlow, T.1
Carela-Español, V.2
Barlet-Ros, P.3
-
41
-
-
85031394372
-
-
Pepitone J (2014) Hackers mount denial-of-service attack with computer clock tool, NBC News, [Online] Available From:. Accessed on Sept 2014
-
Pepitone J (2014) Hackers mount denial-of-service attack with computer clock tool, NBC News, [Online] Available From: http://www.nbcnews.com/tech/security/hackers-mount-denial-service-attack-computer-clock-tool-n27646. Accessed on Sept 2014
-
-
-
-
42
-
-
85031392133
-
-
Dittrich D (1999) The DoS project’s “trinoo” distributed denial of service attack tool,. Accessed on Sept 2014
-
Dittrich D (1999) The DoS project’s “trinoo” distributed denial of service attack tool, http://staff.washington.edu/dittrich/misc/trinoo.analysis.txt. Accessed on Sept 2014
-
-
-
-
43
-
-
85031391637
-
-
Houle K, Dougherty C (2000) Mstream, Incident Notes, IN-2000-05, Carnegie Mellon University. Accessed on Sept. 2014
-
Houle K, Dougherty C (2000) Mstream, Incident Notes, IN-2000-05, Carnegie Mellon University http://www.cert.org/historical/incident_notes/IN-2000-05.cfm. Accessed on Sept. 2014
-
-
-
-
44
-
-
85031392529
-
-
LOIC, Sourceforge.net, 2014,. Accessed on Sept 2014
-
LOIC, Sourceforge.net, 2014, http://sourceforge.net/projects/loic/. Accessed on Sept 2014
-
-
-
-
45
-
-
85031393549
-
-
XOIC, Sourceforge.net, 2014,. Accessed on Sept 2014
-
XOIC, Sourceforge.net, 2014, http://sourceforge.net/projects/xoic/. Accessed on Sept 2014
-
-
-
-
46
-
-
84888391622
-
A survey of defence mechanisms against distributed denial of service (DDoS) flooding attacks
-
Zargar ST, Joshi J, Tipper D (2013) A survey of defence mechanisms against distributed denial of service (DDoS) flooding attacks. Commun Surveys Tutor IEEE 15(4):2046–2069
-
(2013)
Commun Surveys Tutor IEEE
, vol.15
, Issue.4
, pp. 2046-2069
-
-
Zargar, S.T.1
Joshi, J.2
Tipper, D.3
-
47
-
-
0003334329
-
Network ingress filtering: defeating denial of service attacks that employ IP source address spoofing
-
Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service attacks that employ IP source address spoofing, Internet RFC 2827, 2000
-
(2000)
Internet RFC
, vol.2827
, pp. 2000
-
-
Ferguson, P.1
Senie, D.2
-
50
-
-
0842332412
-
Shami S (2003) An efficient filter for denial-of-service bandwidth attacks
-
Abdelsayed S, Glimsholt D, Leckie C, Ryan S, Shami S (2003) An efficient filter for denial-of-service bandwidth attacks. In: Proceedings of the 46th IEEE global telecommunications conference (GLOBECOM03), p. 1353–1357, 2003
-
(2003)
Proceedings of the 46th IEEE global telecommunications conference (GLOBECOM03)
, pp. 1353-1357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
-
51
-
-
85031393098
-
-
Mananet, Reverse Firewall, [online] Available from:. Accessed on Sept 2014
-
Mananet, Reverse Firewall, [online] Available from: http://www.cs3–inc.com/pubs/ReverseFireWall.pdf. Accessed on Sept 2014
-
-
-
-
53
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study
-
Cabrera JD et al (2001) Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study. In: Integrated network management proceedings, p. 609–622, 2001
-
(2001)
Integrated network management proceedings, p
, vol.609-622
, pp. 2001
-
-
Cabrera, J.D.1
-
54
-
-
85031392622
-
Internet denial of service attacks and defence mechanisms. University of Pittsburgh, Department of Computer Science, Technical Report, TR-11-178
-
Abliz M (2011) Internet denial of service attacks and defence mechanisms. University of Pittsburgh, Department of Computer Science, Technical Report, TR-11-178, March 2011
-
(2011)
March
, pp. 2011
-
-
Abliz, M.1
-
55
-
-
33646742035
-
PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Kim Y, Lau WC, Chuah MC, Chao HJ (2006) “PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans Depend Secure Comput 3(2):141–155
-
(2006)
IEEE Trans Depend Secure Comput
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
56
-
-
33749851980
-
Intrusion detection routers: design, implementation and evaluation using an experimental testbed
-
Chan EYK et al (2006) Intrusion detection routers: design, implementation and evaluation using an experimental testbed. IEEE J Sel Areas Commun 24(10):1889–1900
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, Issue.10
, pp. 1889-1900
-
-
Chan, E.Y.K.1
-
57
-
-
85031391658
-
Robinson M (2003) Forming alliance for DDoS defence
-
Ascona, Switzerland
-
Mirkovic J, Reiher P, Robinson M (2003) Forming alliance for DDoS defence. In: Proceeding of new security paradigms Workshop, Centro Stefano Francini, Ascona, Switzerland, 2003
-
Proceeding of new security paradigms Workshop, Centro Stefano Francini
, pp. 2003
-
-
Mirkovic, J.1
Reiher, P.2
-
58
-
-
0142039750
-
IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks
-
Sung Minho, Jun Xu (2013) IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks. Parallel Distrib Syst IEEE Trans 14(9):861–872
-
(2013)
Parallel Distrib Syst IEEE Trans
, vol.14
, Issue.9
, pp. 861-872
-
-
Sung, M.1
Jun, X.2
-
59
-
-
85031391671
-
-
KDD CUP 1999 Data,. Accessed on Sept 2014
-
KDD CUP 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed on Sept 2014
-
-
-
-
60
-
-
85031393020
-
-
DARPA Intrusion Detection Evaluation,. Accessed on Sept 2014
-
DARPA Intrusion Detection Evaluation, http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/2000data.html. Accessed on Sept 2014
-
-
-
-
61
-
-
85031393711
-
-
Cloud Intrusion Detection Dataset,. Accessed on Dec 2014
-
Cloud Intrusion Detection Dataset, http://www.di.unipi.it/~hkholidy/projects/cidd/index.html. Accessed on Dec 2014
-
-
-
-
62
-
-
85031391562
-
-
DEFCON, The Shmoo group. Accessed on Sept 2014
-
DEFCON, The Shmoo group http://cctf.shmoo.com/. Accessed on Sept 2014
-
-
-
-
63
-
-
85031394638
-
-
CAIDA Data, Center for applied internet and data analysis,. Accessed on Sept 2014
-
CAIDA Data, Center for applied internet and data analysis, http://www.caida.org/data/. Accessed on Sept 2014
-
-
-
-
64
-
-
85031393862
-
-
LBNL/ICSI Enterprise tracing project,. Accessed on Sept 2014
-
LBNL/ICSI Enterprise tracing project, http://www.icir.org/enterprise-tracing/. Accessed on Sept 2014
-
-
-
-
65
-
-
85031391809
-
-
UNIBS: Data Sharing. Accessed on Sept 2014
-
UNIBS: Data Sharing http://www.ing.unibs.it/ntw/tools/traces/. Accessed on Sept 2014
-
-
-
-
66
-
-
85031394491
-
-
ISCX-UNB, Datasets- Information Security Center for eXcellence,. Accessed on Sept 2014
-
ISCX-UNB, Datasets- Information Security Center for eXcellence, http://www.iscx.ca/datasets. Accessed on Sept 2014
-
-
-
-
67
-
-
85031392956
-
-
Manpage of TCPDUMP,. Accessed on Sept 2014
-
Manpage of TCPDUMP, http://www.tcpdump.org/tcpdump_man.html. Accessed on Sept 2014
-
-
-
-
68
-
-
85031393068
-
-
Wireshark- Go Deep,. Accessed on Sept 2014
-
Wireshark- Go Deep, https://www.wireshark.org/. Accessed on Sept 2014
-
-
-
-
69
-
-
85031392351
-
-
Firewall Log and Rule Analysis, Security audit, change management—firewall analyzer, ManageEngine 2014,. Accessed on Sept 2014
-
Firewall Log and Rule Analysis, Security audit, change management—firewall analyzer, ManageEngine 2014, http://www.manageengine.com/products/firewall/. Accessed on Sept 2014
-
-
-
-
70
-
-
85031392606
-
-
SNMP Network Monitoring Tool, SpiceWorks, 2014,. Accessed on Sept 2014
-
SNMP Network Monitoring Tool, SpiceWorks, 2014, http://www.spiceworks.com/it-articles/snmp-network-monitoring/. Accessed on Sept 2014
-
-
-
-
71
-
-
85031391894
-
-
Bandwidth Reporting:: NetFlowAnalyzer, ManageEngine 2014,. Accessed on Sept 2014
-
Bandwidth Reporting:: NetFlowAnalyzer, ManageEngine 2014, http://www.manageengine.com/products/netflow/. Accessed on Sept 2014
-
-
-
-
72
-
-
85031393275
-
-
Network Monitoring Software, Network Performance Management, Paessler AG,. Accessed on Sept 2014
-
Network Monitoring Software, Network Performance Management, Paessler AG, http://www.paessler.com/. Accessed on Sept 2014
-
-
-
-
73
-
-
85031391656
-
-
Network Monitoring Software, SolarWinds, 2014,. Accessed on Sept 2014
-
Network Monitoring Software, SolarWinds, 2014, http://www.solarwinds.com/network-performance-monitor.aspx. Accessed on Sept 2014
-
-
-
-
74
-
-
85031394865
-
-
Network Performance Management Software, ManageEngine, 2014,. Accessed on Sept 2014
-
Network Performance Management Software, ManageEngine, 2014, http://www.manageengine.com/network-performance-management.html. Accessed on Sept 2014
-
-
-
-
77
-
-
84861072527
-
Zhao H (2012) Data security and privacy protection issues in cloud computing
-
Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: Computer science and electronics engineering (ICCSEE), 2012 international conference on, IEEE, Hangzhou, vol. 1, p. 647–651, 2012
-
(2012)
Computer science and electronics engineering (ICCSEE), 2012 international conference on, IEEE, Hangzhou, vol. 1
, pp. 647-651
-
-
Chen, D.1
-
78
-
-
84921049113
-
Distributed and cloud computing: from parallel processing to the internet of things
-
Hwang K, Dongarra J, Fox GC (2013) Distributed and cloud computing: from parallel processing to the internet of things, Morgan Kaufmann, 2013
-
(2013)
Morgan Kaufmann
, pp. 2013
-
-
Hwang, K.1
Dongarra, J.2
Fox, G.C.3
-
79
-
-
77950601673
-
Hu Y (2009) Cloud security with virtualized defense and reputation-based trust management
-
Eighth IEEE international conference on, Chengdu
-
Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust management. In: Dependable, autonomic and secure computing, 2009. DASC ‘09. Eighth IEEE international conference on, Chengdu, p. 717–722
-
Dependable, autonomic and secure computing, 2009. DASC ‘09
, pp. 717-722
-
-
Hwang, K.1
Kulkareni, S.2
-
81
-
-
85031392176
-
-
Enrico C et al (2013) Slow DoS attacks: definition and categorisation. Int J Trust Manage Comput Commun 1:300–319
-
Enrico C et al (2013) Slow DoS attacks: definition and categorisation. Int J Trust Manage Comput Commun 1:300–319
-
-
-
-
82
-
-
85031392225
-
-
Singh J, Grewal V (2015) A survey of different strategies to pacify ARP poisoning attacks in wireless networks. Int J Comput Appl 11:25–28
-
Singh J, Grewal V (2015) A survey of different strategies to pacify ARP poisoning attacks in wireless networks. Int J Comput Appl 11:25–28
-
-
-
-
83
-
-
0034497721
-
Distributed denial of service attacks
-
Lau F, Rubin SH, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. In: Systems, man, and cybernetics, 2000 IEEE international conference on, Nashville, TN, p. 2275–2280 vol. 3, 2000
-
(2000)
Systems, man, and cybernetics, 2000 IEEE international conference on, Nashville, TN, p. 2275–2280
, vol.3
, pp. 2000
-
-
Lau, F.1
Rubin, S.H.2
Smith, M.H.3
Trajkovic, L.4
-
84
-
-
80054802993
-
Distributed denial of service prevention techniques
-
Gupta BB, Joshi RC, Misra M (2010) Distributed denial of service prevention techniques. Int J Comput Electr Eng 2(2):1793–8163
-
(2010)
Int J Comput Electr Eng
, vol.2
, Issue.2
, pp. 1793-8163
-
-
Gupta, B.B.1
Joshi, R.C.2
Misra, M.3
-
85
-
-
84964956256
-
DDoS detection and filtering technique in cloud environment using GARCH model
-
Osaka, Japan
-
Badve OP, Gupta BB et al (2015) DDoS detection and filtering technique in cloud environment using GARCH model. In: The proceedings of IEEE GCCE-2015, p. 584–586, Osaka, Japan, 2015
-
(2015)
The proceedings of IEEE GCCE-2015, p
, vol.584-586
, pp. 2015
-
-
Badve, O.P.1
Gupta, B.B.2
-
86
-
-
84897558662
-
An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET)
-
Chhabra Meghna, Gupta BB (2014) An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res J Appl Sci Eng Technol 7(10):2033–2039
-
(2014)
Res J Appl Sci Eng Technol
, vol.7
, Issue.10
, pp. 2033-2039
-
-
Chhabra, M.1
Gupta, B.B.2
-
87
-
-
84898941079
-
Design, deployment and use of HTTP-based Botnet (HBB) Testbed. In proceedings of 16th IEEE international conference on advanced communication technology (ICACT), pp. 1265–1269
-
Alomari E, Manickam S, Gupta BB, Singh P, Anbar M (2014) Design, deployment and use of HTTP-based Botnet (HBB) Testbed. In proceedings of 16th IEEE international conference on advanced communication technology (ICACT), pp. 1265–1269, South Korea, 2014
-
(2014)
South Korea
, pp. 2014
-
-
Alomari, E.1
Manickam, S.2
Gupta, B.B.3
Singh, P.4
Anbar, M.5
-
89
-
-
84897500180
-
A novel solution to handle DDOS attack in MANET
-
Chhabra M, Gupta BB, Almomani A (2013) A novel solution to handle DDOS attack in MANET. J Inf Secur. 4(3):165–179
-
(2013)
J Inf Secur.
, vol.4
, Issue.3
, pp. 165-179
-
-
Chhabra, M.1
Gupta, B.B.2
Almomani, A.3
-
90
-
-
81255179879
-
European intelligence and security informatics conference (EISIC), p. 178–182
-
Agrawal PK, Gupta BB, Jain S (2011) SVM based scheme for predicting number of zombies in a DDoS attack. 2011 European intelligence and security informatics conference (EISIC), p. 178–182, Greece, 2011
-
(2011)
Greece
, pp. 2011
-
-
Agrawal, P.K.1
Gupta, B.B.2
-
91
-
-
85031391739
-
Securing SAP on the Cloud. In SAP on the Cloud, Springer
-
Missbach M, Staerk T, Gardiner C, McCloud J, Madl R, Tempes M, Anderson G (2016) Securing SAP on the Cloud. In SAP on the Cloud, Springer, Berlin Heidelberg, pp. 75–120
-
(2016)
Berlin Heidelberg
, pp. 75-120
-
-
Missbach, M.1
Staerk, T.2
Gardiner, C.3
McCloud, J.4
Madl, R.5
Tempes, M.6
Anderson, G.7
-
92
-
-
84946217074
-
Massimiliano R (2016) Economic denial of sustainability mitigation in cloud computing
-
Springer, Berlin
-
Ficco M, Massimiliano R (2016) Economic denial of sustainability mitigation in cloud computing. In: Organizational innovation and change, Springer, Berlin p. 229–238
-
Organizational innovation and change
, pp. 229-238
-
-
Ficco, M.1
|