메뉴 건너뛰기




Volumn 28, Issue 12, 2017, Pages 3655-3682

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment

Author keywords

Artificial neural network; Cloud computing; DDoS attacks; DoS; GARCH model; Nonlinear time series model

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; COMPUTER CRIME; DISTRIBUTED COMPUTER SYSTEMS; DOS; NETWORK SECURITY; NEURAL NETWORKS; TRANSMISSION CONTROL PROTOCOL;

EID: 84963679961     PISSN: 09410643     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00521-016-2317-5     Document Type: Review
Times cited : (188)

References (92)
  • 1
    • 85031391396 scopus 로고    scopus 로고
    • Mathew Prince (2013) The DDoS That Knoked Spamhaus Offline (And How We Mitigated It). CloudFlare Blog [Online] Available from:. Accessed on Sept 2014
    • Mathew Prince (2013) The DDoS That Knoked Spamhaus Offline (And How We Mitigated It). CloudFlare Blog [Online] Available from: http://blog.Cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho/. Accessed on Sept 2014
  • 2
    • 84894646147 scopus 로고    scopus 로고
    • Network anomaly detection: methods, systems and tools
    • Bhuyan MH et al (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surveys Tutor 16(1):303–336
    • (2014) IEEE Commun Surveys Tutor , vol.16 , Issue.1 , pp. 303-336
    • Bhuyan, M.H.1
  • 4
    • 70350422660 scopus 로고    scopus 로고
    • Chaos theory based detection against network mimicking DDoS attacks
    • Chonka Ashley, Singh Jaipal, Zhou Wanlei (2009) Chaos theory based detection against network mimicking DDoS attacks. Commun Lett IEEE 13(9):717–719
    • (2009) Commun Lett IEEE , vol.13 , Issue.9 , pp. 717-719
    • Chonka, A.1    Singh, J.2    Zhou, W.3
  • 5
    • 84878708621 scopus 로고    scopus 로고
    • DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory
    • Chen Yonghong, Ma Xinlei, Xinya Wu (2013) DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory. Commun Lett IEEE 17(5):1052–1054
    • (2013) Commun Lett IEEE , vol.17 , Issue.5 , pp. 1052-1054
    • Chen, Y.1    Ma, X.2    Xinya, W.3
  • 6
    • 33646516485 scopus 로고
    • Possible generalization of Boltzmann-Gibbs statistics
    • Tsallis C (1988) Possible generalization of Boltzmann-Gibbs statistics. J Stat Phys 52(1–2):479–487
    • (1988) J Stat Phys , vol.52 , Issue.1-2 , pp. 479-487
    • Tsallis, C.1
  • 7
    • 84893749338 scopus 로고    scopus 로고
    • DDoS detection method based on chaos analysis of network traffic entropy
    • Ma Xinlei, Chen Yonghong (2014) DDoS detection method based on chaos analysis of network traffic entropy. IEEE Commun Lett 18(1):114–117
    • (2014) IEEE Commun Lett , vol.18 , Issue.1 , pp. 114-117
    • Ma, X.1    Chen, Y.2
  • 8
    • 84892597103 scopus 로고    scopus 로고
    • Validation of chaos hypothesis in NADA and improved DDoS detection algorithm
    • Wu Xinya, Chen Yonghong (2013) Validation of chaos hypothesis in NADA and improved DDoS detection algorithm. Commun Lett IEEE 17(12):2396–2399
    • (2013) Commun Lett IEEE , vol.17 , Issue.12 , pp. 2396-2399
    • Wu, X.1    Chen, Y.2
  • 9
    • 33646742035 scopus 로고    scopus 로고
    • PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Kim Y, Lau WC, Chuah MC, Chao HJ (2006) PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans Dependable Secur Comput 3(2):141–155
    • (2006) IEEE Trans Dependable Secur Comput , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 10
    • 85031394554 scopus 로고    scopus 로고
    • Detecting and tracing DDoS attacks by intelligent decision prototype. Pervasive computing and communications, 2008
    • Chonka A et al (2008) Detecting and tracing DDoS attacks by intelligent decision prototype. Pervasive computing and communications, 2008, Sixth annual IEEE international conference on
    • (2008) Sixth annual IEEE international conference on
    • Chonka, A.1
  • 11
    • 0001647024 scopus 로고    scopus 로고
    • Practical network support for IP traceback. SIGCOMM’00, Stockholm
    • Savage S, Wetherall D, Karlin A, Anderson T (2001) Practical network support for IP traceback. SIGCOMM’00, Stockholm, Sweden, 2000
    • (2001) Sweden , pp. 2000
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 13
    • 51849137884 scopus 로고    scopus 로고
    • Protecting web services with service oriented traceback architecture. Computer and information technology, 2008
    • Chonka A, Wanlei Z, Yang X (2008) Protecting web services with service oriented traceback architecture. Computer and information technology, 2008, CIT 2008, 8th IEEE international conference on, 2008
    • (2008) CIT 2008, 8th IEEE international conference on , pp. 2008
    • Chonka, A.1    Wanlei, Z.2    Yang, X.3
  • 14
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    • Elsevier
    • Chonka et al (2010) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl 34(4):1097–1107 (Elsevier)
    • (2010) J Netw Comput Appl , vol.34 , Issue.4 , pp. 1097-1107
    • Chonka1
  • 15
    • 85031392828 scopus 로고    scopus 로고
    • Ko R, Lee SSG (2013) Cloud computing vulnerability incidents: a statistical overview [Online] Available from:. Accessed on Sept 2014
    • Ko R, Lee SSG (2013) Cloud computing vulnerability incidents: a statistical overview [Online] Available from: https://downloads.Cloudsecurityalliance.org/initiatives/cvwg/CSA_Whitepaper_Cloud_Computing_Vulnerability_Incidents.zip. Accessed on Sept 2014
  • 16
    • 85031392787 scopus 로고    scopus 로고
    • Arbor Networks, Inc (2014) Worldwide infrastructure security report volume IX [Online]. Available from: [Accessed on Sept. 2014]
    • Arbor Networks, Inc (2014) Worldwide infrastructure security report volume IX [Online]. Available from: http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf [Accessed on Sept. 2014]
  • 17
    • 85031392747 scopus 로고    scopus 로고
    • Incapsula Inc. (2014) 2013–2014 DoS threat landscape report [Online]. Available from:. Accessed on Sept 2014
    • Incapsula Inc. (2014) 2013–2014 DoS threat landscape report [Online]. Available from: http://www.incapsula.com/blog/ddos-threat-landscape-report-2014.html. Accessed on Sept 2014
  • 19
    • 85031392471 scopus 로고    scopus 로고
    • Google App Engine, Google Inc.,. Accessed on Sept 2014
    • Google App Engine, Google Inc., http://Cloud.google.com/appengine. Accessed on Sept 2014
  • 20
    • 85031392273 scopus 로고    scopus 로고
    • Azure: Microsoft’s Cloud Platform, Microsoft Corporation,. Accessed on Sept 2014
    • Azure: Microsoft’s Cloud Platform, Microsoft Corporation, http://azure.microsoft.com/en-us/. Accessed on Sept 2014
  • 21
    • 85031393338 scopus 로고    scopus 로고
    • Amazon Elastic Compute Cloud (Amazon EC2), Amazon, Amazon. Accessed on Sept 2014
    • Amazon Elastic Compute Cloud (Amazon EC2), Amazon, http://aws.amazon.com/ec2/, Amazon. Accessed on Sept 2014
  • 22
    • 85031392525 scopus 로고    scopus 로고
    • IBM Cloud Computing, IBM,. Accessed on Sept 2014
    • IBM Cloud Computing, IBM, http://www.ibm.com/Cloud-computing/in/en/. Accessed on Sept 2014
  • 23
    • 85031391870 scopus 로고    scopus 로고
    • Amazon VPC, Amazon,. Accessed on Sept 2014
    • Amazon VPC, Amazon, http://aws.amazon.com/vpc/. Accessed on Sept 2014
  • 24
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini Subashini, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
    • (2011) J Netw Comput Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 25
    • 85031394796 scopus 로고    scopus 로고
    • Gartner: Seven Cloud Computing Security Risks, Networkworld,. Accessed on Sept 2014
    • Gartner: Seven Cloud Computing Security Risks, Networkworld, http://www.networkworld.com/article/2281535/data-center/gartner–seven-Cloud-computing-security-risks.html. Accessed on Sept 2014
  • 26
    • 84897106892 scopus 로고    scopus 로고
    • Security issues in cloud environments: a survey
    • Fernandes DAB et al (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170
    • (2014) Int J Inf Secur , vol.13 , Issue.2 , pp. 113-170
    • Fernandes, D.A.B.1
  • 27
    • 84857170570 scopus 로고    scopus 로고
    • Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation
    • Behl A (2011) Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation. In: Information and communication technologies (WICT), 2011 world congress on, p. 217–222, 2011
    • (2011) Information and communication technologies (WICT), 2011 world congress on, p , vol.217-222 , pp. 2011
    • Behl, A.1
  • 29
    • 84873369523 scopus 로고    scopus 로고
    • Using Cloud computing to implement a security overlay network
    • Salah K, Calero JA (2013) Using Cloud computing to implement a security overlay network. IEEE Secur Privacy 11(1):44–53
    • (2013) IEEE Secur Privacy , vol.11 , Issue.1 , pp. 44-53
    • Salah, K.1    Calero, J.A.2
  • 31
    • 78650154288 scopus 로고    scopus 로고
    • A new form of DOS attack in a cloud and its avoidance mechanism
    • ACM workshop on cloud computing security workshop, ACM
    • Liu, H (2010) A new form of DOS attack in a cloud and its avoidance mechanism. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop, ACM, 2010
    • (2010) Proceedings of the , vol.2010 , pp. 2010
    • Liu, H.1
  • 33
    • 85031393756 scopus 로고    scopus 로고
    • Hackers break into server for Obamacare website: U.S. officials, Reuters, 2014. Accessed on Sept 2014
    • Hackers break into server for Obamacare website: U.S. officials, Reuters, 2014 http://www.reuters.com/article/2014/09/04/us-usa-healthcare-cybersecurity-idUSKBN0GZ2RF20140904. Accessed on Sept 2014
  • 34
    • 85031392577 scopus 로고    scopus 로고
    • CERT Advisory, CA-1996-01, Carnegie Mellon University, 2014,. Accessed on Sept 2014
    • CERT Advisory, CA-1996-01, Carnegie Mellon University, 2014, http://www.cert.org/historical/advisories/CA-1996-01.cfm. Accessed on Sept 2014
  • 35
    • 85031392755 scopus 로고    scopus 로고
    • DDoS Attack Types and Mitigation Methods, IncapsulaInc, 2014,. Accessed on Sept 2014
    • DDoS Attack Types and Mitigation Methods, IncapsulaInc, 2014, http://www.incapsula.com/ddos/ddos-attacks/. Accessed on Sept 2014
  • 36
    • 85031393694 scopus 로고    scopus 로고
    • DoS Attacks and Free DoS Attacking Tools, Infosec Institute, 2014,. Accessed on Sept 2014
    • DoS Attacks and Free DoS Attacking Tools, Infosec Institute, 2014, http://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/. Accessed on Sept 2014
  • 37
    • 85031392284 scopus 로고    scopus 로고
    • CERT Advisory CA-1997-28, Carnegie Mellon University, 2014,. Accessed on Sept 2014
    • CERT Advisory CA-1997-28, Carnegie Mellon University, 2014, http://www.cert.org/historical/advisories/ca-1997-28.cfm. Accessed on Sept 2014
  • 38
    • 85031391938 scopus 로고    scopus 로고
    • CERT Advisory CA-1996-21, Carnegie Mellon University, 2014. Accessed on Sept 2014
    • CERT Advisory CA-1996-21, Carnegie Mellon University, 2014 http://www.cert.org/historical/advisories/ca-1996-21.cfm. Accessed on Sept 2014
  • 39
    • 85031392713 scopus 로고    scopus 로고
    • The NSL-KDD Dataset,. Accessed 18 Mar 2016
    • The NSL-KDD Dataset, http://www.unb.ca/research/iscx/dataset/iscx-NSL-KDD-dataset.html. Accessed 18 Mar 2016
  • 40
    • 85031394800 scopus 로고    scopus 로고
    • Extended independent comparison of popular deep packet inspection (DPI) Tools for Traffic Classification, [Online]
    • Bujlow T, Carela-Español V, Barlet-Ros P (2014) Extended independent comparison of popular deep packet inspection (DPI) Tools for Traffic Classification, [Online]. Available from: http://vbn.aau.dk/files/179043085/TBU_Extended_dpi_report.pdf
    • (2014) Available from:
    • Bujlow, T.1    Carela-Español, V.2    Barlet-Ros, P.3
  • 41
    • 85031394372 scopus 로고    scopus 로고
    • Pepitone J (2014) Hackers mount denial-of-service attack with computer clock tool, NBC News, [Online] Available From:. Accessed on Sept 2014
    • Pepitone J (2014) Hackers mount denial-of-service attack with computer clock tool, NBC News, [Online] Available From: http://www.nbcnews.com/tech/security/hackers-mount-denial-service-attack-computer-clock-tool-n27646. Accessed on Sept 2014
  • 42
    • 85031392133 scopus 로고    scopus 로고
    • Dittrich D (1999) The DoS project’s “trinoo” distributed denial of service attack tool,. Accessed on Sept 2014
    • Dittrich D (1999) The DoS project’s “trinoo” distributed denial of service attack tool, http://staff.washington.edu/dittrich/misc/trinoo.analysis.txt. Accessed on Sept 2014
  • 43
    • 85031391637 scopus 로고    scopus 로고
    • Houle K, Dougherty C (2000) Mstream, Incident Notes, IN-2000-05, Carnegie Mellon University. Accessed on Sept. 2014
    • Houle K, Dougherty C (2000) Mstream, Incident Notes, IN-2000-05, Carnegie Mellon University http://www.cert.org/historical/incident_notes/IN-2000-05.cfm. Accessed on Sept. 2014
  • 44
    • 85031392529 scopus 로고    scopus 로고
    • LOIC, Sourceforge.net, 2014,. Accessed on Sept 2014
    • LOIC, Sourceforge.net, 2014, http://sourceforge.net/projects/loic/. Accessed on Sept 2014
  • 45
    • 85031393549 scopus 로고    scopus 로고
    • XOIC, Sourceforge.net, 2014,. Accessed on Sept 2014
    • XOIC, Sourceforge.net, 2014, http://sourceforge.net/projects/xoic/. Accessed on Sept 2014
  • 46
    • 84888391622 scopus 로고    scopus 로고
    • A survey of defence mechanisms against distributed denial of service (DDoS) flooding attacks
    • Zargar ST, Joshi J, Tipper D (2013) A survey of defence mechanisms against distributed denial of service (DDoS) flooding attacks. Commun Surveys Tutor IEEE 15(4):2046–2069
    • (2013) Commun Surveys Tutor IEEE , vol.15 , Issue.4 , pp. 2046-2069
    • Zargar, S.T.1    Joshi, J.2    Tipper, D.3
  • 47
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: defeating denial of service attacks that employ IP source address spoofing
    • Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service attacks that employ IP source address spoofing, Internet RFC 2827, 2000
    • (2000) Internet RFC , vol.2827 , pp. 2000
    • Ferguson, P.1    Senie, D.2
  • 51
    • 85031393098 scopus 로고    scopus 로고
    • Mananet, Reverse Firewall, [online] Available from:. Accessed on Sept 2014
    • Mananet, Reverse Firewall, [online] Available from: http://www.cs3–inc.com/pubs/ReverseFireWall.pdf. Accessed on Sept 2014
  • 53
    • 51149105210 scopus 로고    scopus 로고
    • Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study
    • Cabrera JD et al (2001) Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study. In: Integrated network management proceedings, p. 609–622, 2001
    • (2001) Integrated network management proceedings, p , vol.609-622 , pp. 2001
    • Cabrera, J.D.1
  • 54
    • 85031392622 scopus 로고    scopus 로고
    • Internet denial of service attacks and defence mechanisms. University of Pittsburgh, Department of Computer Science, Technical Report, TR-11-178
    • Abliz M (2011) Internet denial of service attacks and defence mechanisms. University of Pittsburgh, Department of Computer Science, Technical Report, TR-11-178, March 2011
    • (2011) March , pp. 2011
    • Abliz, M.1
  • 55
    • 33646742035 scopus 로고    scopus 로고
    • PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Kim Y, Lau WC, Chuah MC, Chao HJ (2006) “PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans Depend Secure Comput 3(2):141–155
    • (2006) IEEE Trans Depend Secure Comput , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 56
    • 33749851980 scopus 로고    scopus 로고
    • Intrusion detection routers: design, implementation and evaluation using an experimental testbed
    • Chan EYK et al (2006) Intrusion detection routers: design, implementation and evaluation using an experimental testbed. IEEE J Sel Areas Commun 24(10):1889–1900
    • (2006) IEEE J Sel Areas Commun , vol.24 , Issue.10 , pp. 1889-1900
    • Chan, E.Y.K.1
  • 58
    • 0142039750 scopus 로고    scopus 로고
    • IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks
    • Sung Minho, Jun Xu (2013) IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks. Parallel Distrib Syst IEEE Trans 14(9):861–872
    • (2013) Parallel Distrib Syst IEEE Trans , vol.14 , Issue.9 , pp. 861-872
    • Sung, M.1    Jun, X.2
  • 59
    • 85031391671 scopus 로고    scopus 로고
    • KDD CUP 1999 Data,. Accessed on Sept 2014
    • KDD CUP 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed on Sept 2014
  • 60
    • 85031393020 scopus 로고    scopus 로고
    • DARPA Intrusion Detection Evaluation,. Accessed on Sept 2014
    • DARPA Intrusion Detection Evaluation, http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/2000data.html. Accessed on Sept 2014
  • 61
    • 85031393711 scopus 로고    scopus 로고
    • Cloud Intrusion Detection Dataset,. Accessed on Dec 2014
    • Cloud Intrusion Detection Dataset, http://www.di.unipi.it/~hkholidy/projects/cidd/index.html. Accessed on Dec 2014
  • 62
    • 85031391562 scopus 로고    scopus 로고
    • DEFCON, The Shmoo group. Accessed on Sept 2014
    • DEFCON, The Shmoo group http://cctf.shmoo.com/. Accessed on Sept 2014
  • 63
    • 85031394638 scopus 로고    scopus 로고
    • CAIDA Data, Center for applied internet and data analysis,. Accessed on Sept 2014
    • CAIDA Data, Center for applied internet and data analysis, http://www.caida.org/data/. Accessed on Sept 2014
  • 64
    • 85031393862 scopus 로고    scopus 로고
    • LBNL/ICSI Enterprise tracing project,. Accessed on Sept 2014
    • LBNL/ICSI Enterprise tracing project, http://www.icir.org/enterprise-tracing/. Accessed on Sept 2014
  • 65
    • 85031391809 scopus 로고    scopus 로고
    • UNIBS: Data Sharing. Accessed on Sept 2014
    • UNIBS: Data Sharing http://www.ing.unibs.it/ntw/tools/traces/. Accessed on Sept 2014
  • 66
    • 85031394491 scopus 로고    scopus 로고
    • ISCX-UNB, Datasets- Information Security Center for eXcellence,. Accessed on Sept 2014
    • ISCX-UNB, Datasets- Information Security Center for eXcellence, http://www.iscx.ca/datasets. Accessed on Sept 2014
  • 67
    • 85031392956 scopus 로고    scopus 로고
    • Manpage of TCPDUMP,. Accessed on Sept 2014
    • Manpage of TCPDUMP, http://www.tcpdump.org/tcpdump_man.html. Accessed on Sept 2014
  • 68
    • 85031393068 scopus 로고    scopus 로고
    • Wireshark- Go Deep,. Accessed on Sept 2014
    • Wireshark- Go Deep, https://www.wireshark.org/. Accessed on Sept 2014
  • 69
    • 85031392351 scopus 로고    scopus 로고
    • Firewall Log and Rule Analysis, Security audit, change management—firewall analyzer, ManageEngine 2014,. Accessed on Sept 2014
    • Firewall Log and Rule Analysis, Security audit, change management—firewall analyzer, ManageEngine 2014, http://www.manageengine.com/products/firewall/. Accessed on Sept 2014
  • 70
    • 85031392606 scopus 로고    scopus 로고
    • SNMP Network Monitoring Tool, SpiceWorks, 2014,. Accessed on Sept 2014
    • SNMP Network Monitoring Tool, SpiceWorks, 2014, http://www.spiceworks.com/it-articles/snmp-network-monitoring/. Accessed on Sept 2014
  • 71
    • 85031391894 scopus 로고    scopus 로고
    • Bandwidth Reporting:: NetFlowAnalyzer, ManageEngine 2014,. Accessed on Sept 2014
    • Bandwidth Reporting:: NetFlowAnalyzer, ManageEngine 2014, http://www.manageengine.com/products/netflow/. Accessed on Sept 2014
  • 72
    • 85031393275 scopus 로고    scopus 로고
    • Network Monitoring Software, Network Performance Management, Paessler AG,. Accessed on Sept 2014
    • Network Monitoring Software, Network Performance Management, Paessler AG, http://www.paessler.com/. Accessed on Sept 2014
  • 73
    • 85031391656 scopus 로고    scopus 로고
    • Network Monitoring Software, SolarWinds, 2014,. Accessed on Sept 2014
    • Network Monitoring Software, SolarWinds, 2014, http://www.solarwinds.com/network-performance-monitor.aspx. Accessed on Sept 2014
  • 74
    • 85031394865 scopus 로고    scopus 로고
    • Network Performance Management Software, ManageEngine, 2014,. Accessed on Sept 2014
    • Network Performance Management Software, ManageEngine, 2014, http://www.manageengine.com/network-performance-management.html. Accessed on Sept 2014
  • 78
    • 84921049113 scopus 로고    scopus 로고
    • Distributed and cloud computing: from parallel processing to the internet of things
    • Hwang K, Dongarra J, Fox GC (2013) Distributed and cloud computing: from parallel processing to the internet of things, Morgan Kaufmann, 2013
    • (2013) Morgan Kaufmann , pp. 2013
    • Hwang, K.1    Dongarra, J.2    Fox, G.C.3
  • 79
    • 77950601673 scopus 로고    scopus 로고
    • Hu Y (2009) Cloud security with virtualized defense and reputation-based trust management
    • Eighth IEEE international conference on, Chengdu
    • Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust management. In: Dependable, autonomic and secure computing, 2009. DASC ‘09. Eighth IEEE international conference on, Chengdu, p. 717–722
    • Dependable, autonomic and secure computing, 2009. DASC ‘09 , pp. 717-722
    • Hwang, K.1    Kulkareni, S.2
  • 81
    • 85031392176 scopus 로고    scopus 로고
    • Enrico C et al (2013) Slow DoS attacks: definition and categorisation. Int J Trust Manage Comput Commun 1:300–319
    • Enrico C et al (2013) Slow DoS attacks: definition and categorisation. Int J Trust Manage Comput Commun 1:300–319
  • 82
    • 85031392225 scopus 로고    scopus 로고
    • Singh J, Grewal V (2015) A survey of different strategies to pacify ARP poisoning attacks in wireless networks. Int J Comput Appl 11:25–28
    • Singh J, Grewal V (2015) A survey of different strategies to pacify ARP poisoning attacks in wireless networks. Int J Comput Appl 11:25–28
  • 84
    • 80054802993 scopus 로고    scopus 로고
    • Distributed denial of service prevention techniques
    • Gupta BB, Joshi RC, Misra M (2010) Distributed denial of service prevention techniques. Int J Comput Electr Eng 2(2):1793–8163
    • (2010) Int J Comput Electr Eng , vol.2 , Issue.2 , pp. 1793-8163
    • Gupta, B.B.1    Joshi, R.C.2    Misra, M.3
  • 85
    • 84964956256 scopus 로고    scopus 로고
    • DDoS detection and filtering technique in cloud environment using GARCH model
    • Osaka, Japan
    • Badve OP, Gupta BB et al (2015) DDoS detection and filtering technique in cloud environment using GARCH model. In: The proceedings of IEEE GCCE-2015, p. 584–586, Osaka, Japan, 2015
    • (2015) The proceedings of IEEE GCCE-2015, p , vol.584-586 , pp. 2015
    • Badve, O.P.1    Gupta, B.B.2
  • 86
    • 84897558662 scopus 로고    scopus 로고
    • An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET)
    • Chhabra Meghna, Gupta BB (2014) An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res J Appl Sci Eng Technol 7(10):2033–2039
    • (2014) Res J Appl Sci Eng Technol , vol.7 , Issue.10 , pp. 2033-2039
    • Chhabra, M.1    Gupta, B.B.2
  • 87
    • 84898941079 scopus 로고    scopus 로고
    • Design, deployment and use of HTTP-based Botnet (HBB) Testbed. In proceedings of 16th IEEE international conference on advanced communication technology (ICACT), pp. 1265–1269
    • Alomari E, Manickam S, Gupta BB, Singh P, Anbar M (2014) Design, deployment and use of HTTP-based Botnet (HBB) Testbed. In proceedings of 16th IEEE international conference on advanced communication technology (ICACT), pp. 1265–1269, South Korea, 2014
    • (2014) South Korea , pp. 2014
    • Alomari, E.1    Manickam, S.2    Gupta, B.B.3    Singh, P.4    Anbar, M.5
  • 89
    • 84897500180 scopus 로고    scopus 로고
    • A novel solution to handle DDOS attack in MANET
    • Chhabra M, Gupta BB, Almomani A (2013) A novel solution to handle DDOS attack in MANET. J Inf Secur. 4(3):165–179
    • (2013) J Inf Secur. , vol.4 , Issue.3 , pp. 165-179
    • Chhabra, M.1    Gupta, B.B.2    Almomani, A.3
  • 90
    • 81255179879 scopus 로고    scopus 로고
    • European intelligence and security informatics conference (EISIC), p. 178–182
    • Agrawal PK, Gupta BB, Jain S (2011) SVM based scheme for predicting number of zombies in a DDoS attack. 2011 European intelligence and security informatics conference (EISIC), p. 178–182, Greece, 2011
    • (2011) Greece , pp. 2011
    • Agrawal, P.K.1    Gupta, B.B.2
  • 92
    • 84946217074 scopus 로고    scopus 로고
    • Massimiliano R (2016) Economic denial of sustainability mitigation in cloud computing
    • Springer, Berlin
    • Ficco M, Massimiliano R (2016) Economic denial of sustainability mitigation in cloud computing. In: Organizational innovation and change, Springer, Berlin p. 229–238
    • Organizational innovation and change , pp. 229-238
    • Ficco, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.