메뉴 건너뛰기




Volumn 77, Issue 4, 2018, Pages 4609-4639

A novel approach to defend multimedia flash crowd in cloud environment

Author keywords

Cloud security; DDoS attack; Flash crowd; Flash crowd neutralization; Hierarchical caching; User s QoE

Indexed keywords

BOTNET; DISTRIBUTED COMPUTER SYSTEMS; MULTIMEDIA SERVICES; NETWORK SECURITY;

EID: 85018687758     PISSN: 13807501     EISSN: 15737721     Source Type: Journal    
DOI: 10.1007/s11042-017-4742-6     Document Type: Article
Times cited : (13)

References (49)
  • 4
    • 84948661313 scopus 로고    scopus 로고
    • QoS-adaptive service configuration framework for cloud-assisted video surveillance systems
    • Alamri A, Hossain MS, Almogren A et al (2016) QoS-adaptive service configuration framework for cloud-assisted video surveillance systems. Multimedia Tools and Applications, Springer 75(21):13333–13348
    • (2016) Multimedia Tools and Applications, Springer , vol.75 , Issue.21 , pp. 13333-13348
    • Alamri, A.1    Hossain, M.S.2    Almogren, A.3
  • 5
    • 2442452908 scopus 로고    scopus 로고
    • August 1998, Accessed 23 April 2016
    • Arlitt M, Jin T (1998) 1998 world cup web site access logs. August 1998. http://ita.ee.lbl.gov/html/contrib/WorldCup.html. Accessed 23 April 2016
    • (1998) World cup web site access logs
    • Arlitt, M.1    Jin, T.2
  • 7
    • 84872155077 scopus 로고    scopus 로고
    • Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
    • Elsevier
    • Arun P, Kumar R, Selvakumar S (2013) Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Computer Communications, Elsevier 36(3):303–319
    • (2013) Computer Communications , vol.36 , Issue.3 , pp. 303-319
    • Arun, P.1    Kumar, R.2    Selvakumar, S.3
  • 12
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • Chen Y, Hwang K (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, Elsevier 66(9):1137–1151
    • (2006) Journal of Parallel and Distributed Computing, Elsevier , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 14
    • 85042088120 scopus 로고    scopus 로고
    • Accessed Jan 2017
    • DDoS Trends Report, Verisign. https://www.verisign.com/en_IN/security-services/ddos-protection/ddos-report/index.xhtml. Accessed Jan 2017
    • (2017) DDoS Trends Report, Verisign
  • 16
    • 84863616826 scopus 로고    scopus 로고
    • An orchestration approach for unwanted internet traffic identification
    • Elsevier
    • Feitosa E, Souto E, Sadok DH (2012) An orchestration approach for unwanted internet traffic identification. Computer Networks, Elsevier 56(12):2805–2831
    • (2012) Computer Networks , vol.56 , Issue.12 , pp. 2805-2831
    • Feitosa, E.1    Souto, E.2    Sadok, D.H.3
  • 19
    • 85016036959 scopus 로고    scopus 로고
    • Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective
    • Gupta BB, Joshi RC, Misra M (2009) Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective, Taylor & Francis 18(5):224–247
    • (2009) Taylor & Francis , vol.18 , Issue.5 , pp. 224-247
    • Gupta, B.B.1    Joshi, R.C.2    Misra, M.3
  • 23
    • 84992348042 scopus 로고    scopus 로고
    • Modeling and optimization of bandwidth supply performance for cloud-assisted video systems under flash crowd
    • Jia S, Zhang R, Ma Y, Zhong L, Xu C (2016) Modeling and optimization of bandwidth supply performance for cloud-assisted video systems under flash crowd. China Communications 13(9):151–162
    • (2016) China Communications , vol.13 , Issue.9 , pp. 151-162
    • Jia, S.1    Zhang, R.2    Ma, Y.3    Zhong, L.4    Xu, C.5
  • 26
    • 84881230370 scopus 로고
    • Queueing Systems. Wiley-Interscience publication, New York
    • L Kleinrock (1975) Theory, volume 1. Queueing Systems. Wiley-Interscience publication,New York
    • (1975) Theory, volume 1
    • Kleinrock, L.1
  • 28
    • 84930542540 scopus 로고    scopus 로고
    • L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing
    • Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26
    • (2015) Knowl-Based Syst , vol.79 , pp. 18-26
    • Li, J.1    Liu, Z.2    Chen, X.3    Xhafa, F.4    Tan, X.5    Wong, D.S.6
  • 29
    • 84921381171 scopus 로고    scopus 로고
    • Identity-based encryption with outsourced revocation in cloud computing
    • Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437
    • (2015) IEEE Trans Comput , vol.64 , Issue.2 , pp. 425-437
    • Li, J.1    Li, J.2    Chen, X.3    Jia, C.4    Lou, W.5
  • 30
    • 84890481146 scopus 로고    scopus 로고
    • Preventing DDoS attacks by identifier/locator separation
    • Luo H, Lin Y, Zhang H, Zukerman M (2013) Preventing DDoS attacks by identifier/locator separation. IEEE Netw 27(6):60–65
    • (2013) IEEE Netw , vol.27 , Issue.6 , pp. 60-65
    • Luo, H.1    Lin, Y.2    Zhang, H.3    Zukerman, M.4
  • 32
    • 84861307113 scopus 로고    scopus 로고
    • The NIST Definition of cloud computing. National Institute of Standards and Technology, U.S Department of Commerce, Computer security division, Information Technology Laboratory
    • Mell P, Grance T (2011) The NIST Definition of cloud computing. National Institute of Standards and Technology, U.S Department of Commerce, Computer security division, Information Technology Laboratory, NIST special publication 800-145
    • (2011) NIST special publication , pp. 145-800
    • Mell, P.1    Grance, T.2
  • 35
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Peng T, Leckie C, Ramamohanarao K (2007) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv 39(1):1-42
    • (2007) ACM Comput Surv , vol.39 , Issue.1 , pp. 1-42
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 36
    • 84862009854 scopus 로고    scopus 로고
    • DDoS flooding attack detection scheme based on F-divergence
    • Elsevier
    • Rahmani H, Sahli N, Kamoun F (2012) DDoS flooding attack detection scheme based on F-divergence. Computer Communications, Elsevier 35(11):1380–1391
    • (2012) Computer Communications , vol.35 , Issue.11 , pp. 1380-1391
    • Rahmani, H.1    Sahli, N.2    Kamoun, F.3
  • 39
    • 84992312325 scopus 로고    scopus 로고
    • Accessed 23 April 2016
    • The CAIDA UCSD "DDoS Attack 2007" Dataset. http://www.caida.org/data/passive/ddos-20070804_dataset.xml. Accessed 23 April 2016
    • (2007) The CAIDA UCSD "DDoS Attack 2007" Dataset
  • 43
    • 84901044385 scopus 로고    scopus 로고
    • Automatic scaling of internet applications for cloud computing services
    • Xiao Z, Chen Q, Luo H (2014) Automatic scaling of internet applications for cloud computing services. IEEE Trans Comput 63(5):1111–1123
    • (2014) IEEE Trans Comput , vol.63 , Issue.5 , pp. 1111-1123
    • Xiao, Z.1    Chen, Q.2    Luo, H.3
  • 44
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Xie Y, Yu SZ (2009) A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Networking 17(1):54–65
    • (2009) IEEE/ACM Trans Networking , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.Z.2
  • 45
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Xie Y, Yu SZ (2009) Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans Networking 17(1):15–25
    • (2009) IEEE/ACM Trans Networking , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.Z.2
  • 49
    • 84919476166 scopus 로고    scopus 로고
    • Fool me if you can: mimicking attacks and anti-attacks in cyberspace
    • Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans Comput 64(1):139–151
    • (2015) IEEE Trans Comput , vol.64 , Issue.1 , pp. 139-151
    • Yu, S.1    Guo, S.2    Stojmenovic, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.