메뉴 건너뛰기




Volumn 452, Issue , 2016, Pages 345-358

A real-time (on premise) baseline based DDoS mitigation scheme in a hybrid cloud

Author keywords

DDoS; Dedicated mechanism; Hybrid cloud; IDS; IPS; Mitigation

Indexed keywords

COMPUTER CRIME; DISTRIBUTED COMPUTER SYSTEMS; INTERNET PROTOCOLS; INTRUSION DETECTION; MERCURY (METAL); NETWORK SECURITY; UNINTERRUPTIBLE POWER SYSTEMS;

EID: 84976473226     PISSN: 21945357     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-981-10-1023-1_35     Document Type: Conference Paper
Times cited : (2)

References (14)
  • 1
    • 84976466572 scopus 로고    scopus 로고
    • DDoS Defense guide, Accessed 6 Oct 2015
    • DDoS Defense guide.: http://www.cisco.com. Accessed 6 Oct 2015
  • 2
    • 84976506332 scopus 로고    scopus 로고
    • Defeating DDOS attacks, Accessed 6 Oct 2015
    • Defeating DDOS attacks.: http://www.cisco.com/c/en/us/products/collateral/security/trafficanomaly-detector-xt5600a/prod_white_paper0900aecd8011e927.html. Accessed 6 Oct 2015
  • 3
    • 84987657624 scopus 로고    scopus 로고
    • An approach for detecting and preventing DOS attacks in LAN
    • Tabash, M., Barhoom, T.: An approach for detecting and preventing DOS attacks in LAN. Int. J. Comput. Trends Technol. 18, 265–271 (2014)
    • (2014) Int. J. Comput. Trends Technol , vol.18 , pp. 265-271
    • Tabash, M.1    Barhoom, T.2
  • 4
    • 84875865722 scopus 로고    scopus 로고
    • New framework to detect and prevent denial of service attack in cloud computing environment
    • Ismail, M.N., Aborujilah, A., Musa, S., Shahzad, A.: New framework to detect and prevent denial of service attack in cloud computing environment. Int. J. Comput. Sci. and Secur. 6, 226–237 (2012)
    • (2012) Int. J. Comput. Sci. and Secur , vol.6 , pp. 226-237
    • Ismail, M.N.1    Aborujilah, A.2    Musa, S.3    Shahzad, A.4
  • 5
    • 84879852394 scopus 로고    scopus 로고
    • Novel intrusion detection system integrating layered framework with neural network
    • Srivastav, N., Challa, R.K.: Novel intrusion detection system integrating layered framework with neural network. In: 3rd IEEE International Advance Computing Conference, pp. 682–689 (2013)
    • (2013) 3Rd IEEE International Advance Computing Conference , pp. 682-689
    • Srivastav, N.1    Challa, R.K.2
  • 6
    • 84987665717 scopus 로고    scopus 로고
    • Analytical approach for mitigation and prevention of DDoS attack using binomial theorem with bloom filter an overlay network traffic
    • Shyamala Devi, V., Umarani, R.D.: Analytical approach for mitigation and prevention of DDoS attack using binomial theorem with bloom filter an overlay network traffic. Int. J. Adv. Res. Comput. Commun. Eng. 2, 3031–3036 (2013)
    • (2013) Int. J. Adv. Res. Comput. Commun. Eng , vol.2 , pp. 3031-3036
    • Shyamala Devi, V.1    Umarani, R.D.2
  • 7
    • 84976474214 scopus 로고    scopus 로고
    • Defending against application-layer DDoS attacks, Accessed 8 Oct 2015
    • Defending against application-layer DDoS attacks.: http://www.juniper.net/assets/us/en/local/pdf/whitepapers/2000550-en.pdf. Accessed 8 Oct 2015
  • 8
    • 84976479607 scopus 로고    scopus 로고
    • The Impact of Application Layer Denial of Service Attacks, Accessed 8 Oct 2015
    • The Impact of Application Layer Denial of Service Attacks.: http://www.cs.unb.ca/~natalia/ApplDDoS.pdf. Accessed 8 Oct 2015
  • 9
    • 84881568318 scopus 로고    scopus 로고
    • A hybrid approach to counter application layer DDoS attacks
    • Devi, S.R., Yogesh, P.: A hybrid approach to counter application layer DDoS attacks. Int. J. Crypt. Inform. Secur. 2, 45–52 (2012)
    • (2012) Int. J. Crypt. Inform. Secur , vol.2 , pp. 45-52
    • Devi, S.R.1    Yogesh, P.2
  • 10
    • 85006121170 scopus 로고    scopus 로고
    • Protection from application layer DDoS attacks for popular websites
    • Rajesh, S.: Protection from application layer DDoS attacks for popular websites. Int. J. Elect. Eng. 5, 555–558 (2013)
    • (2013) Int. J. Elect. Eng , vol.5 , pp. 555-558
    • Rajesh, S.1
  • 11
    • 84891909440 scopus 로고    scopus 로고
    • A novel data security model for cloud computing
    • Ajoudanian, S., Ahmadi, M.R.: A novel data security model for cloud computing. Int. J. Eng. Technol. 4, 326–329 (2012)
    • (2012) Int. J. Eng. Technol , vol.4 , pp. 326-329
    • Ajoudanian, S.1    Ahmadi, M.R.2
  • 13
    • 84976518641 scopus 로고    scopus 로고
    • Layer Seven DDoS Attacks, Accessed 12 Oct 2015
    • Layer Seven DDoS Attacks.: http://resources.infosecinstitute.com/layer-seven-ddos-attacks/. Accessed 12 Oct 2015
  • 14
    • 84976496985 scopus 로고    scopus 로고
    • Socket Programming, Accessed 12 Oct 2015
    • Socket Programming. home.iitk.ac.in/~chebrolu/scourse/slides/sockets-tutorial.pdf. Accessed 12 Oct 2015


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.