A Survey on Methods to Defend against DDoS Attack in Cloud Computing
暂无分享,去创建一个
Seyed Mostafa Mirhosseini | M. Zamani | Sara Farahmandian | A. Akbarabadi | Joobin Moghimi Zadeh | MAZDAK ZAMANI | SARA FARAHMANDIAN | AHAD AKBARABADI | JOOBIN MOGHIMI ZADEH | SEYED MOSTAFA MIRHOSSEINI | sarah. farahmandian
[1] Mazdak Zamani,et al. Improving the security of protected wireless internet access from insider attacks , 2012 .
[2] Bing Zhang,et al. Formal Discussion on Relationship between Virtualization and Cloud Computing , 2010, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies.
[3] Yongzhao Zhan,et al. Virtualization and Cloud Computing , 2019, CompTIA® A+® Complete Practice Tests.
[4] Hossein Rouhani Zeidanloo,et al. Botnet detection based on traffic monitoring , 2010, 2010 International Conference on Networking and Information Technology.
[5] JongWon Kim,et al. Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[6] Pritesh Jain,et al. A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment , 2011, 2011 World Congress on Information and Communication Technologies.
[7] Dongming Lu,et al. Optimal control of DDoS defense with multi-resource max-min fairness , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.
[8] Weimin Zheng,et al. Defend Against Denial of Service Attack with VMM , 2009, 2009 Eighth International Conference on Grid and Cooperative Computing.
[9] Honarbakhsh Shohreh,et al. Dynamic Monitoring in Ad Hoc Network , 2012 .
[10] Irfan Gul,et al. Distributed Cloud Intrusion Detection Model , 2011 .
[11] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[12] M. Janbeglou,et al. Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[13] Mojtaba Alizadeh,et al. A Survey on Attacks in RFID Networks , 2012 .
[14] Mojtaba Alizadeh,et al. Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .
[15] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[16] Jeongnyeo Kim,et al. Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding , 2012, ICICS.
[17] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[18] Ming Li,et al. An Adaptive Approach for Defending against DDoS Attacks , 2010 .
[19] Mazdak Zamani,et al. A survey on security issues of federated identity in the cloud computing , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[20] Hossein Rouhani Zeidanloo,et al. A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[21] Farzad Sabahi,et al. Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[22] Mazdak Zamani,et al. A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[23] Gnanasekaran Aghila,et al. A Filter Tree Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS Attack , 2012, ISI.