-
4
-
-
84948661313
-
QoS-adaptive service configuration framework for cloud-assisted video surveillance systems
-
Alamri A, Hossain MS, Almogren A et al (2016) QoS-adaptive service configuration framework for cloud-assisted video surveillance systems. Multimedia Tools and Applications, Springer 75(21):13333–13348
-
(2016)
Multimedia Tools and Applications, Springer
, vol.75
, Issue.21
, pp. 13333-13348
-
-
Alamri, A.1
Hossain, M.S.2
Almogren, A.3
-
5
-
-
2442452908
-
-
August 1998, Accessed 23 April 2016
-
Arlitt M, Jin T (1998) 1998 world cup web site access logs. August 1998. http://ita.ee.lbl.gov/html/contrib/WorldCup.html. Accessed 23 April 2016
-
(1998)
World cup web site access logs
-
-
Arlitt, M.1
Jin, T.2
-
7
-
-
84872155077
-
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
-
Elsevier
-
Arun P, Kumar R, Selvakumar S (2013) Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Computer Communications, Elsevier 36(3):303–319
-
(2013)
Computer Communications
, vol.36
, Issue.3
, pp. 303-319
-
-
Arun, P.1
Kumar, R.2
Selvakumar, S.3
-
8
-
-
66249147541
-
-
Bailey M, Cooke E, Jahanian F, Xu Y, Karir M (2009) A survey of botnet technology and defenses. Conference for homeland security, CATCH '09. Washington, DC, pp 299-304
-
(2009)
A survey of botnet technology and defenses. Conference for homeland security, CATCH '09. Washington, DC, pp 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
11
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82–89
-
(2006)
IEEE Internet Comput
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
12
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
Chen Y, Hwang K (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, Elsevier 66(9):1137–1151
-
(2006)
Journal of Parallel and Distributed Computing, Elsevier
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
14
-
-
85042088120
-
-
Accessed Jan 2017
-
DDoS Trends Report, Verisign. https://www.verisign.com/en_IN/security-services/ddos-protection/ddos-report/index.xhtml. Accessed Jan 2017
-
(2017)
DDoS Trends Report, Verisign
-
-
-
15
-
-
84955489039
-
Handling flash-crowd events to improve the performance of web applications
-
In, New York
-
de Paula J U, Drummond LMA, de Oliveira D, Frota Y, Barbosa VC (2015) Handling flash-crowd events to improve the performance of web applications. In proceedings of the 30th annual ACM Symposium on applied computing (SAC '15), New York, pp 769-774
-
(2015)
Proceedings of the 30th annual ACM Symposium on applied computing (SAC '15)
, pp. 769-774
-
-
de Paula, J.U.1
Drummond, L.M.A.2
de Oliveira, D.3
Frota, Y.4
Barbosa, V.C.5
-
16
-
-
84863616826
-
An orchestration approach for unwanted internet traffic identification
-
Elsevier
-
Feitosa E, Souto E, Sadok DH (2012) An orchestration approach for unwanted internet traffic identification. Computer Networks, Elsevier 56(12):2805–2831
-
(2012)
Computer Networks
, vol.56
, Issue.12
, pp. 2805-2831
-
-
Feitosa, E.1
Souto, E.2
Sadok, D.H.3
-
19
-
-
85016036959
-
Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective
-
Gupta BB, Joshi RC, Misra M (2009) Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective, Taylor & Francis 18(5):224–247
-
(2009)
Taylor & Francis
, vol.18
, Issue.5
, pp. 224-247
-
-
Gupta, B.B.1
Joshi, R.C.2
Misra, M.3
-
20
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
-
Holz T, Steiner M, Dahl F, Biersack E, Freiling FC (2008) Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In proceedings of USENIX LEET, pp 1-9
-
(2008)
Proceedings of USENIX LEET
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.C.5
-
23
-
-
84992348042
-
Modeling and optimization of bandwidth supply performance for cloud-assisted video systems under flash crowd
-
Jia S, Zhang R, Ma Y, Zhong L, Xu C (2016) Modeling and optimization of bandwidth supply performance for cloud-assisted video systems under flash crowd. China Communications 13(9):151–162
-
(2016)
China Communications
, vol.13
, Issue.9
, pp. 151-162
-
-
Jia, S.1
Zhang, R.2
Ma, Y.3
Zhong, L.4
Xu, C.5
-
24
-
-
77953077374
-
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
-
In, ACM, New York
-
Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In Proceedings of the 11th international conference on world wide web (WWW '02). ACM, New York, pp. 293–304
-
(2002)
Proceedings of the 11th international conference on world wide web (WWW '02)
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
25
-
-
84924375780
-
Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds
-
In, Berkeley
-
Kandula S, Katabi D, Jacob M, Berger A (2005) Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation. Volume 2 (NSDI'05), USENIX Association, Berkeley, pp 287–300
-
(2005)
Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation. Volume 2 (NSDI'05), USENIX Association
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
26
-
-
84881230370
-
-
Queueing Systems. Wiley-Interscience publication, New York
-
L Kleinrock (1975) Theory, volume 1. Queueing Systems. Wiley-Interscience publication,New York
-
(1975)
Theory, volume 1
-
-
Kleinrock, L.1
-
27
-
-
84927584035
-
A Hybrid Cloud Approach for Secure Authorized Deduplication
-
Li J, Li YK, Chen X, Lee PPC, Lou W (2015) A Hybrid Cloud Approach for Secure Authorized Deduplication. IEEE Transactions on Parallel and Distributed Systems 26(5):1206–1216
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.C.4
Lou, W.5
-
28
-
-
84930542540
-
L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing
-
Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26
-
(2015)
Knowl-Based Syst
, vol.79
, pp. 18-26
-
-
Li, J.1
Liu, Z.2
Chen, X.3
Xhafa, F.4
Tan, X.5
Wong, D.S.6
-
29
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
30
-
-
84890481146
-
Preventing DDoS attacks by identifier/locator separation
-
Luo H, Lin Y, Zhang H, Zukerman M (2013) Preventing DDoS attacks by identifier/locator separation. IEEE Netw 27(6):60–65
-
(2013)
IEEE Netw
, vol.27
, Issue.6
, pp. 60-65
-
-
Luo, H.1
Lin, Y.2
Zhang, H.3
Zukerman, M.4
-
32
-
-
84861307113
-
The NIST Definition of cloud computing. National Institute of Standards and Technology, U.S Department of Commerce, Computer security division, Information Technology Laboratory
-
Mell P, Grance T (2011) The NIST Definition of cloud computing. National Institute of Standards and Technology, U.S Department of Commerce, Computer security division, Information Technology Laboratory, NIST special publication 800-145
-
(2011)
NIST special publication
, pp. 145-800
-
-
Mell, P.1
Grance, T.2
-
33
-
-
84954228443
-
When hybrid cloud meets flash crowd: towards cost-effective service provisioning
-
Niu Y, Luo B, Liu F, Liu J, Li B (2015) When hybrid cloud meets flash crowd: towards cost-effective service provisioning. In: IEEE conference on Computer Communications (INFOCOM). Kowloon, pp 1044-1052
-
(2015)
IEEE conference on Computer Communications (INFOCOM). Kowloon
, pp. 1044-1052
-
-
Niu, Y.1
Luo, B.2
Liu, F.3
Liu, J.4
Li, B.5
-
35
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Peng T, Leckie C, Ramamohanarao K (2007) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv 39(1):1-42
-
(2007)
ACM Comput Surv
, vol.39
, Issue.1
, pp. 1-42
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
36
-
-
84862009854
-
DDoS flooding attack detection scheme based on F-divergence
-
Elsevier
-
Rahmani H, Sahli N, Kamoun F (2012) DDoS flooding attack detection scheme based on F-divergence. Computer Communications, Elsevier 35(11):1380–1391
-
(2012)
Computer Communications
, vol.35
, Issue.11
, pp. 1380-1391
-
-
Rahmani, H.1
Sahli, N.2
Kamoun, F.3
-
37
-
-
33847761464
-
Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies
-
Scherrer A, Larrieu N, Owezarski P, Borgnat P, Abry P (2007) Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing 4(1):56–70
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
38
-
-
84962175874
-
An approach to deal with processing surges in cloud computing
-
Segalin D, Santin AO, Marynowski JE, Segalin L, Maziero C (2015) An approach to deal with processing surges in cloud computing. In: IEEE 39th annual Computer software and applications conference, Taichung, pp 897-905
-
(2015)
IEEE 39th annual Computer software and applications conference, Taichung
, pp. 897-905
-
-
Segalin, D.1
Santin, A.O.2
Marynowski, J.E.3
Segalin, L.4
Maziero, C.5
-
39
-
-
84992312325
-
-
Accessed 23 April 2016
-
The CAIDA UCSD "DDoS Attack 2007" Dataset. http://www.caida.org/data/passive/ddos-20070804_dataset.xml. Accessed 23 April 2016
-
(2007)
The CAIDA UCSD "DDoS Attack 2007" Dataset
-
-
-
42
-
-
80051870839
-
-
Wu Y, Wu C, Li B, Qiu X, Lau FCM (2011) CloudMedia: when cloud on demand meets video on demand. In 31st IEEE international conference on distributed computing systems, Minneapolis, pp 268-277
-
(2011)
CloudMedia: when cloud on demand meets video on demand. In 31st IEEE international conference on distributed computing systems, Minneapolis, pp 268-277
-
-
Wu, Y.1
Wu, C.2
Li, B.3
Qiu, X.4
Lau, F.C.M.5
-
43
-
-
84901044385
-
Automatic scaling of internet applications for cloud computing services
-
Xiao Z, Chen Q, Luo H (2014) Automatic scaling of internet applications for cloud computing services. IEEE Trans Comput 63(5):1111–1123
-
(2014)
IEEE Trans Comput
, vol.63
, Issue.5
, pp. 1111-1123
-
-
Xiao, Z.1
Chen, Q.2
Luo, H.3
-
44
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Xie Y, Yu SZ (2009) A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Networking 17(1):54–65
-
(2009)
IEEE/ACM Trans Networking
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.Z.2
-
45
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Xie Y, Yu SZ (2009) Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans Networking 17(1):15–25
-
(2009)
IEEE/ACM Trans Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.Z.2
-
46
-
-
85042104257
-
Utility computing on global grids, Chapter 143
-
In, JohnWiley & Sons, New York
-
C. S. Yeo et al., Utility computing on global grids, Chapter 143. In Hossein Bidgoli(ed.), The Handbook of Computer Networks. ISBN: 978–0–471-78461–6, JohnWiley & Sons, New York, 2007.
-
Hossein Bidgoli(ed.), The Handbook of Computer Networks. ISBN: 978–0–471-78461–6
, pp. 2007
-
-
Yeo, C.S.1
-
47
-
-
84860543902
-
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
-
Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Transactions on Parallel and Distributed Systems 23(6):1073–1080
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.6
, pp. 1073-1080
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
48
-
-
84906077010
-
Can we beat DDoS attacks in clouds?
-
Yu S, Tian Y, Guo S, Wu DO (2014) Can we beat DDoS attacks in clouds? IEEE Transactions on Parallel and Distributed Systems 25(9):2245–2254
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.9
, pp. 2245-2254
-
-
Yu, S.1
Tian, Y.2
Guo, S.3
Wu, D.O.4
-
49
-
-
84919476166
-
Fool me if you can: mimicking attacks and anti-attacks in cyberspace
-
Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans Comput 64(1):139–151
-
(2015)
IEEE Trans Comput
, vol.64
, Issue.1
, pp. 139-151
-
-
Yu, S.1
Guo, S.2
Stojmenovic, I.3
|