Study of intrusion detection system for DDoS attacks in cloud computing
暂无分享,去创建一个
[1] Nur Izura Udzir,et al. Hierarchical secure virtualization model for cloud , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[2] Christoph Meinel,et al. Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[3] Akihiro Nakao,et al. DDoS defense as a network service , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[4] Tao Zhang,et al. Defense of DDoS attack for cloud computing , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[5] Fabrizio Baiardi,et al. CIDS: A Framework for Intrusion Detection in Cloud Systems , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[6] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[7] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[8] Nur Izura Udzir,et al. A Cloud-based Intrusion Detection Service framework , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[9] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[10] Ahmed Serhrouchni,et al. A collaborative peer-to-peer architecture to defend against DDoS attacks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[11] Sugata Sanyal,et al. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.
[12] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[13] Alina Madalina Lonea,et al. Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.
[14] Yogita A. More,et al. Intrusion Detection System for Cloud Computing , 2014 .
[15] Andreas Blass,et al. Inadequacy of computable loop invariants , 2001, TOCL.
[16] Shui Yu,et al. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[17] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.