메뉴 건너뛰기




Volumn 0, Issue 9781461494904, 2014, Pages 77-93

DDoS attack and defence in cloud

Author keywords

Arrival rate; Cloud computing; Cloud platform; Service rate; Virtual machine

Indexed keywords

CLOUD COMPUTING; VIRTUAL MACHINE;

EID: 84969758283     PISSN: 21915768     EISSN: 21915776     Source Type: Book Series    
DOI: 10.1007/978-1-4614-9491-1_5     Document Type: Chapter
Times cited : (2)

References (30)
  • 2
    • 84861643521 scopus 로고    scopus 로고
    • Vdn: Virtual machine image distribution network for cloud data centers
    • C. Peng, M. Kim, Z. Zhang, and H. Lei, “Vdn: Virtual machine image distribution network for cloud data centers,” in Proceedings of the INFOCOM, 2012, pp. 181–189.
    • (2012) Proceedings of the INFOCOM , pp. 181-189
    • Peng, C.1    Kim, M.2    Zhang, Z.3    Lei, H.4
  • 3
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, 2011.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 6
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed ip traffic using hop-count filtering
    • H. Wang, C. Jin, and K. G. Shin, “Defense against spoofed ip traffic using hop-count filtering,” IEEE/ACM Transactions on Networking, vol. 15, no. 1, pp. 40–53, 2007.
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 7
    • 33646742035 scopus 로고    scopus 로고
    • Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, “Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 2, pp. 141–155, 2006.
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 9
    • 84861634583 scopus 로고    scopus 로고
    • Can we beat legitimate cyber behavior mimicking attacks from botnets?
    • S. Yu, S. Guo, and I. Stojmenovic, “Can we beat legitimate cyber behavior mimicking attacks from botnets?” in Proceedings of the INFOCOM, 2012.
    • (2012) In Proceedings of the INFOCOM
    • Yu, S.1    Guo, S.2    Stojmenovic, I.3
  • 10
    • 15544363902 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam, “Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles,” IEEE/ACM Transactions on Networking, vol. 13, no. 1, pp. 29–42, 2005.
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.1 , pp. 29-42
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3    Yam, Y.4
  • 11
    • 34247601459 scopus 로고    scopus 로고
    • A divide-and-conquer strategy for thwarting distributed denial-of-service attacks
    • R. Chen, J.-M. Park, and R. Marchany, “A divide-and-conquer strategy for thwarting distributed denial-of-service attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577–588, 2007.
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.5 , pp. 577-588
    • Chen, R.1    Park, J.-M.2    Marchany, R.3
  • 12
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of ddos attacks over multiple network domains
    • Y. Chen, K. Hwang, and W.-S. Ku, “Collaborative detection of ddos attacks over multiple network domains,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649–1662, 2007.
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 13
    • 84860544941 scopus 로고    scopus 로고
    • Firecol, a collaborative protection network for the detection of flooding ddos attacks
    • J. Francois, I. Aib, and R. Boutaba, “Firecol, a collaborative protection network for the detection of flooding ddos attacks,” IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1828–1841, 2012.
    • (2012) IEEE/ACM Transactions on Networking , vol.20 , Issue.6 , pp. 1828-1841
    • Francois, J.1    Aib, I.2    Boutaba, R.3
  • 14
    • 84856328279 scopus 로고    scopus 로고
    • Edos-shield - a two-steps mitigation technique against edos attacks in cloud computing
    • M. H. Sqalli, F. Al-Haidari, and K. Salah, “Edos-shield - a two-steps mitigation technique against edos attacks in cloud computing,” in Proceedings of the UCC, 2011, pp. 49–56.
    • (2011) Proceedings of the UCC , pp. 49-56
    • Sqalli, M.H.1    Al-Haidari, F.2    Salah, K.3
  • 15
    • 84875706647 scopus 로고    scopus 로고
    • The insecurity of cloud utility models
    • J. Idziorek, M. Tannian, and D. Jacobson, “The insecurity of cloud utility models,” IT Professional, vol. 15, no. 2, pp. 22–27, 2013.
    • (2013) IT Professional , vol.15 , Issue.2 , pp. 22-27
    • Idziorek, J.1    Tannian, M.2    Jacobson, D.3
  • 17
    • 79960631828 scopus 로고    scopus 로고
    • Mitigating ddos attacks with transparent and intelligent fast-flux swarm network
    • R. Lua and K. C. Yow, “Mitigating ddos attacks with transparent and intelligent fast-flux swarm network,” IEEE Network, no. July/August, pp. 28–33, 2011.
    • (2011) IEEE Network, No. July/August , pp. 28-33
    • Lua, R.1    Yow, K.C.2
  • 18
    • 85045971126 scopus 로고    scopus 로고
    • Wang, “On-demand security architecture for cloud computing,” Computer, vol. 99, no
    • J. Chen, Y. Wang, and X. Wang, “On-demand security architecture for cloud computing,” Computer, vol. 99, no. PrePrints, 2012.
    • (2012) Preprints
    • Chen, J.1    Wang, Y.2
  • 19
    • 85046000920 scopus 로고    scopus 로고
    • CloudWatch, http://aws.amazon.com/cloudwatch/.
  • 20
    • 85045984920 scopus 로고    scopus 로고
    • http://aws.amazon.com/ec2/pricing/.
  • 22
    • 79960888404 scopus 로고    scopus 로고
    • Twinkle: A fast resource provisioning mechanism for internet services
    • J. Zhu, Z. Jiang, and Z. Xiao, “Twinkle: A fast resource provisioning mechanism for internet services,” in Proceedings of the INFOCOM, 2011, pp. 802–810.
    • (2011) Proceedings of the INFOCOM , pp. 802-810
    • Zhu, J.1    Jiang, Z.2    Xiao, Z.3
  • 24
    • 84859728505 scopus 로고    scopus 로고
    • Performance analysis of cloud computing centers using m/g/m/m+r queuing systems
    • H. Khazaei, J. V. Misic, and V. B. Misic, “Performance analysis of cloud computing centers using m/g/m/m+r queuing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 5, pp. 936–943, 2012.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.5 , pp. 936-943
    • Khazaei, H.1    Misic, J.V.2    Misic, V.B.3
  • 25
    • 72249085365 scopus 로고    scopus 로고
    • The first erlang century - and the next
    • J. F. C. Kingman, “The first erlang century - and the next,” Queueing Systems, vol. 63, no. 1–4, pp. 3–12, 2009.
    • (2009) Queueing Systems , vol.63 , Issue.1-4 , pp. 3-12
    • Kingman, J.F.C.1
  • 26
    • 0003821875 scopus 로고    scopus 로고
    • Wiley Interscience, 1975, vol. I: Theory
    • L. Kleinrock, Queueing Systems. Wiley Interscience, 1975, vol. I: Theory.
    • Queueing Systems
    • Kleinrock, L.1
  • 30
    • 84891350551 scopus 로고    scopus 로고
    • A general cloud firewall framework with dynamic resource allocation
    • S. Yu, W. Zhou, R. Doss, and S. Guo, “A general cloud firewall framework with dynamic resource allocation,” in Proceedings of the IEEE ICC, 2013.
    • (2013) Proceedings of the IEEE ICC
    • Yu, S.1    Zhou, W.2    Doss, R.3    Guo, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.