210
Rashmi V. Deshmukh and Kailas K. Devadkar / Procedia Computer Science 49 ( 2015 ) 202 – 210
12. Meiko Jensen, Jorg Schwenk, Nil Gruschka “On technical issues in cloud computing”,
IEEE International Conference on cloud computing
,
2009.
13. The Notorious Nine, Cloud Computing Top Threats in 2013, https:
//
downloads.cloudsecurityalliance.org
/
initiatives
/
topthreats
/
TheNotoriousNi
neCloudComputingTopThreatsin2013.pdf
14. N. Weiler, Honeypots for Distributed Denial of Service, in
Proceedings of the Eleventh IEEE International Workshops Enabling Technologies:
Infrastructure for Collaborative Enterprises 2002
, Pitsburgh, PA, USA, June 2002, pp. 109114.
15. P. Ferguson, D. Senie, Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing, in: RFC 2827,
2001.
16. Global Incident analysis Center Special Notice Egress filtering, Available from http:
//
www.sans.org
/
y2k
/
egress.htm.
17. K. Park, H. Lee, On the e
ff
ectiveness of route-based packet filtering for Distributed DoS attack prevention in power law Internets, in:
Proceed-
ings of the ACM SIGCOMM 01 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM
Press
, New York, 2001, pp. 1526.
18. A. Keromytis, V. Misra, D. Rubenstein, SoS: secure overlay services, in:
Proceedings of the ACM SIGCOMM 02 Conference on Applications,
Technologies, Architectures, and Protocols for Computer Communications, ACM Press
, New York, 2002, pp. 6172
19. C. Zou, D. Towsley, and W. Gong, the performance of internet worm scanning strategies, 2003.
20. V. Paxson S. Staniford and N. Weaver, How to own the internet in your spare time, in
11th Usenix Security Symposium
, San Francisco, August
2002.
21. V. Paxson S. Staniford and N. Weaver, How to own the internet in your spare time, in
11th Usenix Security Symposium
, San Francisco, August
2002.
22. C. Zou, D. Towsley, W. Gong, and S. Cai, Routing worm: A fast, selective attack worm based on ip address information, 2005. Common
Vulnerabilities and Exposures, http:
//
cve.mitre.org
/
cve
/
23. J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in:
Dostları ilə paylaş: