1. bookVolume 13 (2013): Issue 1 (March 2013)
Journal Details
License
Format
Journal
eISSN
1314-4081
ISSN
1311-9702
First Published
13 Mar 2012
Publication timeframe
4 times per year
Languages
English
Open Access

Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment

Published Online: 22 Mar 2013
Volume & Issue: Volume 13 (2013) - Issue 1 (March 2013)
Page range: 46 - 60
Journal Details
License
Format
Journal
eISSN
1314-4081
ISSN
1311-9702
First Published
13 Mar 2012
Publication timeframe
4 times per year
Languages
English

1. Janczewski, L. J., D. Reamer, J. Brendel. Handling Distributed Denial-of-Service Attacks. - Information Security Technical Report, Vol. 6, 2001, 37-44.10.1016/S1363-4127(01)00306-5Search in Google Scholar

2. Kumar, P. A. R., S. Selvakumar. Distributed Denial of Service Attack Detection Using an Ensemble of Neural Classifier. - Computer Communications, Vol. 34, 2011, 1328-1341.10.1016/j.comcom.2011.01.012Search in Google Scholar

3. Lent, R. Evaluating a Migration-Based Response to DoS Attacks in a System of Distributed Auctions. - Computers & Amp Security, Vol. 31, 2012, 327-343.10.1016/j.cose.2012.01.001Search in Google Scholar

4. Singh, K., I. Kharbanda, N. Kaur. Security Issues Occur in Cloud Computing and There Solutions. - International Journal on Computer Science and Engineering, Vol. 4, 2012, 945-949.10.5121/ijcsit.2012.4202Search in Google Scholar

5. Huang, C-C, J. Ku. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks. - In: 39th International Conference on Parallel Processing Workshops, 2010, 280-284.Search in Google Scholar

6. Jayadivya, S. K., J. S. Nirmala, M. S. Bhanu. Fault Tolerant Workflow Scheduling Based on Replication and Resubmission of Tasks in Cloud Computing. - International Journal on Computer Science and Engineering, Vol. 4, 2012, 996-1006.Search in Google Scholar

7. Patcha, A., J.-M. Park. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends, Computer Networks. - The International Journal of Computer and Telecommunications Networking, Vol. 1, 2007, 3448-3470.10.1016/j.comnet.2007.02.001Search in Google Scholar

8. Bansal, S., S. Sharma, I. Trivedi, M. Ghosh. Improved Self Fused Check Pointing Replication for Handling Multiple Faults in Cloud Computing. - International Journal on Computer Science and Engineering, Vol. 4, 2012, 1146-1152.Search in Google Scholar

9. Bakshi, A., B. Yogesh. Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine. - In: Second International Conference on Communication Software and Networks, 2010, 260-264.10.1109/ICCSN.2010.56Search in Google Scholar

10. Jung, J., B. Krishnamurthy, M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. - In: WWW '02 Proceedings of the 11th International Conference on World Wide Web, ACM, 2002, 293-304.Search in Google Scholar

11. Kandula, S., D. Katabi, M. Jacob, A. Berger. Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. - In: NSDI ’05: 2nd Symposium on Networked Systems Design & Implementation, 2005, 287-300.Search in Google Scholar

12. Wang, K., C-Y Huang, S-J Lin, Y-D Lin. A Fuzzy Pattern-Based Filtering Algorithm for Botnet Detection, Computer Networks. - The International Journal of Computer and Telecommunications Networking, Vol. 55, 2011, 3275-3286.10.1016/j.comnet.2011.05.026Search in Google Scholar

13. Tripathi, A., A. Mishra. Cloud Computing Security Considerations, IT Division. DOEACC Society, Gorakhpur Centre, Gorakhpur, India, 2010, IEEE.Search in Google Scholar

14. Sabahi, F. Cloud Computing Security Threats and Responses. - In: IEEE 3rd International Conference on Communication Software and Networks, 2011, 245-249.10.1109/ICCSN.2011.6014715Search in Google Scholar

15. Sabahi, F. Virtualization-Level Security in Cloud Computing. - In: IEEE 3rd International Conference on Communication Software and Networks, 2011, 250-254.10.1109/ICCSN.2011.6014716Search in Google Scholar

16. Moses. The Aussie Who Blitzed Visa, MasterCard and PayPal with the Low Orbit Ion Cannon, 9 December, 2010. http:// www.smh.com.au/ technology/ security/ the-aussie-who-blitzed-visa-mastercard- and-paypal-with-the-low-orbit-ion-cannon-20101209-18qr1.htmlSearch in Google Scholar

17. http:// www.opnet.com/ news/ press_releases/ pr-2010/OPNET-Introduces-Cloud-Readiness-Service-pr.htmlSearch in Google Scholar

18. http://www.opnet.com./services/brochures/OPNETCloudReadiness.pdfSearch in Google Scholar

19. Jha, R. K, U. D Dalal. On Demand Cloud Computing Performance Analysis with Low Cost for QoS Application. - In: International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), 2011, 268-271.Search in Google Scholar

20. Rakesh, K. J., U. D. Dalal. A Performance Comparison with Cost for QoS Application in On- Demand Cloud Computing. - IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2011, 11-18.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo