Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm
暂无分享,去创建一个
[1] Jong-Hwan Kim,et al. Introduction of Quantum-inspired Evolutionary Algorithm , 2002 .
[2] Siti Mariyam Shamsuddin,et al. Dynamic quantum-inspired particle swarm optimization as feature and parameter optimizer for evolving spiking neural networks , 2012 .
[3] Rolf Oppliger,et al. Internet security: firewalls and beyond , 1997, CACM.
[4] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[5] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[6] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[8] Chi-Chun Lo,et al. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.
[9] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[10] Angelos D. Keromytis,et al. A Pay-per-Use DoS Protection Mechanism for the Web , 2004, ACNS.
[11] Jethro G. Beekman,et al. Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling , 2013 .
[12] Andrew B. Whinston,et al. Defeating distributed denial of service attacks , 2000 .
[13] Alina Madalina Lonea,et al. Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.
[14] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[15] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[16] Yanchun Liang,et al. A novel quantum swarm evolutionary algorithm and its applications , 2007, Neurocomputing.
[17] B. B. Gupta,et al. Distributed Denial of Service Prevention Techniques , 2012, ArXiv.
[18] Kyaw Thet Khaing,et al. Detection Model for Daniel-of-Service Attacks using Random Forest and k-Nearest Neighbors , 2013 .
[19] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[20] R. Lua,et al. Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network , 2011, IEEE Network.
[21] E. Anitha,et al. A packet marking approach to protect cloud environment against DDoS attacks , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[22] Zhang Xiangxian. Quantum-Inspired Immune Evolutionary Algorithm , 2008, 2008 International Seminar on Business and Information Management.
[23] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[24] K. Venugopal Rao,et al. Guaranteed Quality of Service in Cloud Ready Application , 2013, 2013 International Symposium on Computational and Business Intelligence.
[25] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[26] Junho Choi,et al. Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment , 2013, J. Internet Serv. Inf. Secur..
[27] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[28] Wentao Liu,et al. Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[29] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[30] Aamir Shahzad,et al. Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach , 2013, ICUIMC '13.
[31] B. Joshi,et al. Securing cloud computing environment against DDoS attacks , 2012, 2012 International Conference on Computer Communication and Informatics.
[32] M. Abliz. Internet Denial of Service Attacks and Defense Mechanisms , 2011 .
[33] O. K. Sahingoz,et al. Attack Types and Intrusion Detection Systems in Cloud Computing , .
[34] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.