A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment
暂无分享,去创建一个
[1] S. Selvakumar,et al. Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms , 2009, 2009 IEEE International Advance Computing Conference.
[2] Jung-Min Park,et al. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[3] Brij B. Gupta,et al. A Recent Survey on DDoS Attacks and Defense Mechanisms , 2011 .
[4] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[5] H. Jonathan Chao,et al. PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks , 2006, IEEE Transactions on Dependable and Secure Computing.
[6] V. Sangeetha,et al. Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud , 2013, ArXiv.
[7] H. Jonathan Chao,et al. ALPi: A DDoS Defense System for High-Speed Networks , 2006, IEEE Journal on Selected Areas in Communications.
[8] Shui Yu,et al. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[9] B. B. Gupta,et al. Defending against Distributed Denial of Service Attacks: Issues and Challenges , 2009, Inf. Secur. J. A Glob. Perspect..
[10] A. B. M. Shawkat Ali,et al. Above the Trust and Security in Cloud Computing: A Notion Towards Innovation , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[11] Wanlei Zhou,et al. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.
[12] M Hasan Islam,et al. Cloud computing security auditing , 2011, The 2nd International Conference on Next Generation Information Technology.
[13] Wanlei Zhou,et al. Chaos theory based detection against network mimicking DDoS attacks , 2009, IEEE Communications Letters.
[14] Sateesh K. Peddoju,et al. Packet Monitoring Approach to Prevent DDoS Attack in Cloud Computing , 2012 .
[15] B. B. Gupta,et al. FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain , 2008, 2008 16th IEEE International Conference on Networks.
[16] Chen Eric Yi-Hua,et al. Defending against distributed denial of service attacks , 2005 .
[17] N. Venkatesu,et al. An Effective Defense Against Distributed Denial of Service in GRID , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[18] S.G. Pukale,et al. Detection and defense against DDoS attack with IP spoofing , 2008, 2008 International Conference on Computing, Communication and Networking.
[19] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[20] Esraa Alomari,et al. Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art , 2012, ArXiv.
[21] B. B. Gupta,et al. Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment , 2013, ArXiv.
[22] Cheng Jin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[23] Alina Madalina Lonea,et al. Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.