Accès libre

Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment

À propos de cet article

Citez

1. https://www.cloudflare.com/under-attack (accessed on 1 December 2014)Search in Google Scholar

2. http://www.thedailybeast.com/articles/2010/12/11/hackers-10-most-famous-attacks-wormsand-ddos-takedowns.html (accessed on 1 December 2014)Search in Google Scholar

3. Abdul-Rahman, A., S. Hailes. Using Recommendations for Managing Trust in Distributed Systems. - In: Proc. of IEEE Malaysia International Conference on Communication (MICC’97), 1997.Search in Google Scholar

4. Liu, B., Z. Yua. Incorporating Social Networks and User Opinions for Collaborative Recommendation: Local Trust Network Based Method. - In: Proc. of the Workshop on Context-Aware Movie Recommendation, ACM, 2010, pp. 53-56.Search in Google Scholar

5. Zacharia, G. Trust Management Through Reputation Mechanisms, Workshop in Deception, Fraud and Trust in Agent Societies. - In: Third International Conference on Autonomous Agents (Agents’99), ACM, 1999.Search in Google Scholar

6. Eschenauer, L., V. D. Gligor, J. Bara. On Trust Establishment in Mobile Ad Hoc Networks. - Security Protocols Springer, 2004, pp. 47-66.10.1007/978-3-540-39871-4_6Search in Google Scholar

7. Iyengar, N. C. Sriman Narayana, Gopinath Ganapathy, P. C. Mogan Kumar, Ajith Abraham. A Multilevel Thrust Filtration Defending Mechanism Against Ddos Attacks in Cloud Computing Environment. - International Journal of Grid and Utility Computing, Vol. 5, 2014, No 4, pp. 236-248.10.1504/IJGUC.2014.065384Search in Google Scholar

8. Jeyanthi, N., N. C. S. N. Iyengar. Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment. - International Journal of Communication Networks and Information Security, Vol. 4, 2012, No 3, pp. 163-173.10.17762/ijcnis.v4i3.238Search in Google Scholar

9. http://www.opnet.com/news/press_releases/pr-2010/OPNET-Introduces-Cloud-Readiness-Service-pr.html (accessed on 1 December 2014)Search in Google Scholar

10. Jeyanthi, N., N. C. S. N. Iyengar, P. C. Mogan Kumar, A. Kannamma l. An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment. - International Journal of Communication Networks and Information Security, Vol. 5, 2013, No 2, pp. 110-119.10.17762/ijcnis.v5i2.367Search in Google Scholar

11. http://www.opnet.com./services/brochures/OPNET_CloudReadiness.pdf (accessed on 1 December 2014)Search in Google Scholar

12. Jeyanthi, N., C. Iyengar. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. - Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60. 10.2478/cait-2013-0005Search in Google Scholar

eISSN:
1314-4081
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, Information Technology