-
3
-
-
85088358274
-
-
Open edge computing. http://openedgecomputing.org/aboutoec.html
-
Open edge computing. http://openedgecomputing.org/aboutoec.html.
-
-
-
-
6
-
-
85079003928
-
-
12
-
DDoS & cyber security insights. https://hello.neustar.biz/2016-soc-report-securitylp.html, 12 2016.
-
(2016)
DDoS & Cyber Security Insights
-
-
-
8
-
-
85024397804
-
-
11
-
KrebsOnSecurity hit with record DDoS. https://krebsonsecurity.com/2016/09/ krebsonsecurity-hit-with-record-ddos/, 11 2016.
-
(2016)
KrebsOnSecurity Hit with Record DDoS
-
-
-
9
-
-
85088358129
-
-
7
-
Project shield. https://projectshield.withgoogle.com/public/, 7 2016.
-
(2016)
Project Shield
-
-
-
10
-
-
85088356173
-
-
7
-
BoNeSi. https://github.com/Markus-Go/bonesi, 7 2017.
-
(2017)
BoNeSi
-
-
-
11
-
-
85088354816
-
-
4
-
DDoS mitigation. https://www.akamai.com/us/en/resources/ddos-mitigation.jsp, 4 2017.
-
(2017)
DDoS Mitigation
-
-
-
12
-
-
85088356919
-
-
4
-
DDoS protection. https://www.cloudflare.com/ddos/, 4 2017.
-
(2017)
DDoS Protection
-
-
-
14
-
-
85088354520
-
-
4
-
Hoic - high orbit ion cannon. https://www.incapsula.com/ddos/attack-glossary/high-orbit-ioncannon.html, 4 2017.
-
(2017)
Hoic - High Orbit Ion Cannon
-
-
-
15
-
-
85088357434
-
-
4
-
Hulk, web server DoS tool. http://www.sectorix.com/2012/05/17/hulk-web-server-dos-tool/, 4 2017.
-
(2017)
Hulk, Web Server DoS Tool
-
-
-
16
-
-
85079000010
-
-
4
-
Loic - low orbit ion cannon. https://www.incapsula.com/ddos/attack-glossary/low-orbit-ioncannon.html, 4 2017.
-
(2017)
Loic - Low Orbit Ion Cannon
-
-
-
17
-
-
85088355805
-
-
Open vSwitch. http://openvswitch.org/, 2017
-
Open vSwitch. http://openvswitch.org/, 2017.
-
-
-
-
18
-
-
85088353049
-
-
4
-
Owasp http post tool. https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool, 4 2017.
-
(2017)
Owasp Http Post Tool
-
-
-
19
-
-
85038614532
-
-
2
-
Q4 2016 state of the internet / security report. https://www.akamai.com/us/en/about/ourthinking/state-of-the-internet-report/ global-state-of-the-internet-security-ddos-attack-reports.jsp, 2 2017.
-
(2017)
Q4 2016 State of the Internet / Security Report
-
-
-
21
-
-
85032357759
-
-
4
-
Slowloris. https://www.incapsula.com/ddos/attack-glossary/slowloris.html, 4 2017.
-
(2017)
Slowloris
-
-
-
23
-
-
85068857453
-
Scone: Secure linux containers with intel SGX
-
Savannah, GA
-
ARNAUTOV, S., TRACH, B., GREGOR, F., ET AL. SCONE: Secure Linux Containers with Intel SGX. In Proc. of Symposium on Operating Systems Design and Implementation (OSDI’16) (Savannah, GA, 2016).
-
(2016)
Proc. Of Symposium on Operating Systems Design and Implementation (OSDI’16)
-
-
Arnautov, S.1
Trach, B.2
Gregor, F.3
-
25
-
-
85088355969
-
Fast, scalable and secure onloading of edge functions using airbox
-
BHARDWAJ, K., SHIH, M., AGARWAL, P., GAVRILOVSKA, A., KIM, T., AND SCHWAN, K. Fast, scalable and secure onloading of edge functions using airbox. In Proceedings of first IEEE/ACM symposium on Edge Computing.
-
Proceedings of First IEEE/ACM Symposium on Edge Computing
-
-
Bhardwaj, K.1
Shih, M.2
Agarwal, P.3
Gavrilovska, A.4
Kim, T.5
Schwan, K.6
-
26
-
-
84875531778
-
Fog computing and its role in the internet of things
-
BONOMI, F., MILITO, R., ZHU, J., AND ADDEPALLI, S. Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing.
-
Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
27
-
-
84950330583
-
Traffic characteristics of common dos tools
-
Tech. rep., Masaryk University
-
BUKAC, V. Traffic characteristics of common dos tools. Tech. rep., Masaryk University, Technical report FIMU-RS-2014-02, 2014.
-
(2014)
Technical Report FIMU-RS-2014-02
-
-
Bukac, V.1
-
28
-
-
84962417695
-
Mitigating denial-of-service attacks using secure service overlay model
-
CHOWRIWAR, S. S., MOOL, M. S., SABALE, P. P., PARPELLI, S. S., AND SAMBHE, N. Mitigating denial-of-service attacks using secure service overlay model. International Journal of Engineering Trends and Technology (IJETT) 8, 9 (2014), 37.
-
(2014)
International Journal of Engineering Trends and Technology (IJETT)
, vol.8
, Issue.9
, pp. 37
-
-
Chowriwar, S.S.1
Mool, M.S.2
Sabale, P.P.3
Parpelli, S.S.4
Sambhe, N.5
-
29
-
-
85088356422
-
-
Cisco IoT Networking. https://www.cisco.com/c/m/en_us/solutions/internet-of-things/iot-system.html.
-
Cisco IoT Networking
-
-
-
30
-
-
85076279342
-
Bohatei: Flexible and elastic ddos defense
-
FAYAZ, S. K., TOBIOKA, Y., SEKAR, V., AND BAILEY, M. Bohatei: Flexible and elastic ddos defense. In Usenix Security (2015).
-
(2015)
Usenix Security
-
-
Fayaz, S.K.1
Tobioka, Y.2
Sekar, V.3
Bailey, M.4
-
31
-
-
85088356448
-
Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
-
GIOTIS, K., ARGYROPOULOS, C., ANDROULIDAKIS, G., KALOGERAS, D., AND MAGLARIS, V. Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments. Computer Networks.
-
Computer Networks
-
-
Giotis, K.1
Argyropoulos, C.2
Androulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
32
-
-
85042410953
-
-
11 2016
-
HOLMES, D. 2016 DDoS attack trends. https://f5.com/Portals/1/PDF/security/2016_DDoS_AttackTrends.pdf, 11 2016.
-
(2016)
DDoS Attack Trends
-
-
Holmes, D.1
-
33
-
-
84963757817
-
Mobile edge computingâĂŤa key technology towards 5g
-
HU, Y. C., PATEL, M., SABELLA, D., SPRECHER, N., AND YOUNG, V. Mobile edge computingâĂŤa key technology towards 5g. ETSI White Paper 11 (2015).
-
(2015)
ETSI White Paper
, vol.11
-
-
Hu, Y.C.1
Patel, M.2
Sabella, D.3
Sprecher, N.4
Young, V.5
-
34
-
-
85088356331
-
Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
-
JUNG, J., KRISHNAMURTHY, B., AND RABINOVICH, M. Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites. In Proceedings of the 11th International Conference on World Wide Web, WWW’02.
-
Proceedings of the 11th International Conference on World Wide Web, WWW’02
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
35
-
-
84919935425
-
Software-defined networking: A comprehensive survey
-
Jan
-
KREUTZ, D., RAMOS, F. M. V., VERÃ■SSIMO, P. E., ROTHENBERG, C. E., AZODOLMOLKY, S., AND UHLIG, S. Software-defined networking: A comprehensive survey. Proceedings of the IEEE 103, 1 (Jan 2015), 14–76.
-
(2015)
Proceedings of the IEEE
, vol.103
, Issue.1
, pp. 14-76
-
-
Kreutz, D.1
Ramos, F.M.V.2
Verã■ssimo, P.E.3
Rothenberg, C.E.4
Azodolmolky, S.5
Uhlig, S.6
-
36
-
-
85021775662
-
An end-to-end network slicing framework for 5g wireless communication systems
-
abs/1608.00572
-
LI, Q., WU, G., PAPATHANASSIOU, A., AND UDAYAN, M. An end-to-end network slicing framework for 5g wireless communication systems. CoRR abs/1608.00572 (2016).
-
(2016)
CoRR
-
-
Li, Q.1
Wu, G.2
Papathanassiou, A.3
Udayan, M.4
-
37
-
-
85088357731
-
-
LoRa Alliance. https://www.lora-alliance.org/technology.
-
-
-
-
39
-
-
27644518127
-
D-Ward: A source-end defense against flooding denial-of-service attacks
-
July
-
MIRKOVIC, J., AND REIHER, P. D-WARD: a source-end defense against flooding denial-of-service attacks. IEEE Transactions on Dependable and Secure Computing 2, 3 (July 2005), 216–232.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
40
-
-
84903827722
-
Agnos: A framework for autonomous control of software-defined networks
-
May
-
PASSITO, A., MOTA, E., BENNESBY, R., AND FONSECA, P. Agnos: A framework for autonomous control of software-defined networks. In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (May 2014), pp. 405–412.
-
(2014)
2014 IEEE 28th International Conference on Advanced Information Networking and Applications
, pp. 405-412
-
-
Passito, A.1
Mota, E.2
Bennesby, R.3
Fonseca, P.4
-
41
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
Apr
-
PENG, T., LECKIE, C., AND RAMAMOHANARAO, K. Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv. 39, 1 (Apr. 2007).
-
(2007)
ACM Comput. Surv.
, vol.39
, pp. 1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
42
-
-
38149132429
-
DeFCom: Defensive cooperative overlay mesh
-
April 2
-
ROBINSON, M., MIRKOVIC, J., MICHEL, S., SCHNAIDER, M., AND REIHER, P. Defcom: defensive cooperative overlay mesh. In Proceedings DARPA Information Survivability Conference and Exposition (April 2003), vol. 2, pp. 101–102 vol.2.
-
(2003)
Proceedings DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 101-102
-
-
Robinson, M.1
Mirkovic, J.2
Michel, S.3
Schnaider, M.4
Reiher, P.5
-
43
-
-
84994161818
-
Towards autonomic ddos mitigation using software defined networking
-
Internet society
-
SAHAY, R., BLANC, G., ZHANG, Z., AND DEBAR, H. Towards autonomic ddos mitigation using software defined networking. In SENT 2015: NDSS Workshop on Security of Emerging Networking Technologies (2015), Internet society.
-
(2015)
SENT 2015: NDSS Workshop on Security of Emerging Networking Technologies
-
-
Sahay, R.1
Blanc, G.2
Zhang, Z.3
Debar, H.4
-
44
-
-
84960116587
-
A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets
-
Jan
-
SATYANARAYANAN, M. A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Comp. and Comm. 18, 4 (Jan. 2015), 19–23.
-
(2015)
GetMobile: Mobile Comp. And Comm.
, vol.18
, Issue.4
, pp. 19-23
-
-
Satyanarayanan, M.1
-
45
-
-
79955747674
-
LADS: Large-scale automated DDoS detection system
-
SEKAR, V., DUFFIELD, N. G., SPATSCHECK, O., VAN DER MERWE, J. E., AND ZHANG, H. Lads: Large-scale automated DDoS detection system. In USENIX Annual Technical Conference, General Track (2006), pp. 171–184.
-
(2006)
USENIX Annual Technical Conference, General Track
, pp. 171-184
-
-
Sekar, V.1
Duffield, N.G.2
Spatscheck, O.3
van der Merwe, J.E.4
Zhang, H.5
-
46
-
-
84906786245
-
Overlay networks: An akamai perspective
-
SITARAMAN, R. K., KASBEKAR, M., LICHTENSTEIN, W., AND JAIN, M. Overlay networks: An akamai perspective. Advanced Content Delivery, Streaming, and Cloud Services 51, 4 (2014), 305–328.
-
(2014)
Advanced Content Delivery, Streaming, and Cloud Services
, vol.51
, Issue.4
, pp. 305-328
-
-
Sitaraman, R.K.1
Kasbekar, M.2
Lichtenstein, W.3
Jain, M.4
-
47
-
-
85088355316
-
A primer on 3GPP narrowband internet of things (nbiot)
-
arxiv.org
-
WANG, Y.-P. E., LIN, X., ADHIKARY, A., GROÌĹVLEN, A., SUI, Y., BLANKENSHIP, Y., BERGMAN, J.,, AND RAZAGHI, H. S. A Primer on 3GPP Narrowband Internet of Things (NBIoT). In arxiv.org (2016).
-
(2016)
Arxiv
-
-
Wang, Y.-P.E.1
Lin, X.2
Adhikary, A.3
Groìĺvlen, A.4
Sui, Y.5
Blankenship, Y.6
Bergman, J.7
Razaghi, H.S.8
-
48
-
-
84907313371
-
Paradrop: A multi-tenant platform for dynamically installed third party services on home gateways
-
New York, NY, USA, DCC’14, ACM
-
WILLIS, D. F., DASGUPTA, A., AND BANERJEE, S. Paradrop: A multi-tenant platform for dynamically installed third party services on home gateways. In Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing (New York, NY, USA, 2014), DCC’14, ACM, pp. 43–44.
-
(2014)
Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing
, pp. 43-44
-
-
Willis, D.F.1
Dasgupta, A.2
Banerjee, S.3
-
49
-
-
84888391622
-
A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks
-
Fourth
-
ZARGAR, S. T., JOSHI, J., AND TIPPER, D. A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Communications Surveys Tutorials 15, 4 (Fourth 2013), 2046–2069.
-
(2013)
IEEE Communications Surveys Tutorials
, vol.15
, Issue.4
, pp. 2046-2069
-
-
Zargar, S.T.1
Joshi, J.2
Tipper, D.3
|