Entropy‐based denial‐of‐service attack detection in cloud data center
暂无分享,去创建一个
Fang Dong | Shuai Xu | Jiuxin Cao | Bin Yu | Xiangying Zhu
[1] T. S. Eugene Ng,et al. The Impact of Virtualization on Network Performance of Amazon EC2 Data Center , 2010, 2010 Proceedings IEEE INFOCOM.
[2] Alina Madalina Lonea,et al. Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.
[3] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[4] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[5] Huan Liu,et al. A new form of DOS attack in a cloud and its avoidance mechanism , 2010, CCSW '10.
[6] William H. Press,et al. Numerical Recipes 3rd Edition: The Art of Scientific Computing , 2007 .
[7] Qiang Cao,et al. BigPi : Sharing Link Pools in Cloud Networks , 2013 .
[8] Amin Vahdat,et al. A scalable, commodity data center network architecture , 2008, SIGCOMM '08.
[9] Xiaowei Yang,et al. CloudCmp: comparing public cloud providers , 2010, IMC '10.
[10] Albert G. Greenberg,et al. The cost of a cloud: research problems in data center networks , 2008, CCRV.
[11] Christian E. Hopps,et al. Analysis of an Equal-Cost Multi-Path Algorithm , 2000, RFC.
[12] Dhiren R. Patel,et al. A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[13] Peng Zhang,et al. Collaborative network security in multi-tenant data center for cloud computing , 2014 .
[14] Song Guo,et al. Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Hai Jin,et al. Falloc: Fair network bandwidth allocation in IaaS datacenters via a bargaining game approach , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[16] Xin Jiang,et al. Cloud computing-based forensic analysis for collaborative network security management system , 2013 .
[17] I. Stoica,et al. FairCloud: sharing the network in cloud computing , 2011, CCRV.
[18] Wanlei Zhou,et al. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..
[19] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[20] Radu State,et al. BotCloud: Detecting botnets using MapReduce , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[21] Vasileios Pappas,et al. Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement , 2010, 2010 Proceedings IEEE INFOCOM.
[22] Zhu Youchan,et al. The solution of DDOS attack based on multi-agent , 2010, 2010 International Conference on Educational and Information Technology.
[23] Wanlei Zhou,et al. Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.