[1] |
孙长华, 刘斌 . 分布式拒绝服务攻击研究新进展综述[J]. 电子学报, 2009,37(7):1563-1568. SUN C H , LIU B . Survey on new solutions against distributed denial of service attacks[J]. ACTA Electronica Sinica, 2009,37(7):1563-1568.
|
[2] |
冯登国, 张敏, 张妍 等. 云计算安全研究[J]. 软件学报, 2012,22(1):72-81. FENG D G , ZHANG M , ZHANG Y , et al. Study on cloud computing security[J]. Journal of Software, 2012,22(1):72-81.
|
[3] |
KEROMYTIS A D , MISRA V , RUBENSTEIN D . SOS:an architecture for mitigating DDoS attacks[J]. IEEE Journal on Selected Areas in Communications, 2004,22(1): 176-187.
|
[4] |
STAVROU A , KEROMYTIS A D . Countering DoS attacks with stateless multipath overlays[A]. Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05, Alexandria,Virginia,USA, 2005. 249-259.
|
[5] |
XUAN D , CHELLAPPAN S , WANG X , et al. Analyzing the secure overlay services architecture under intelligent DDoS attacks[A]. Proceedings of the 24th International Conference on Distributed Computing Systems, Tokyo Japan, 2004. 408-417.
|
[6] |
WANG X , CHELLAPPAN S , BOYER P , et al. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks[J]. IEEE Transactions on Parallel and Distributed Systems, Tokyo Japan, 2006,17(7): 619-632.
|
[7] |
IN C H , HONG C S , WEI J , et al. An enhanced SOS architecture for DDoS attack defense using active network technology[A]. Proceedings of Advanced Industrial Conference on Telecommunications/ Service Assurance with Partial and Intermittent Resources Conference/ELearning on Telecommunications Workshop[C]. Lisbon,Portugal, 2005. 90-95.
|
[8] |
KAUR R , SANGA A L , KUMAR K . Secure overlay services (SOS):a critical analysis[A]. 2012 2nd IEEE International Conference on Parallel,Distributed and Grid Computing[C]. Ottawa,Canada, 2012. 457-462.
|
[9] |
卢国强 . 云计算泛联路由平台[J]. 信息安全与技术, 2010,(8):106-108. LU G Q . Tum routing platform in cloud computing[J]. Information Security and Technology, 2010,(8):106-108.
|
[10] |
DING S L , ZHAO X H . Analysis and improvement on Chord protocol for structured P2P[A]. IEEE 3rd International Conference on Communication Software and Networks, 2011. 214-218.
|
[11] |
THIRUVATHUKAL G K , HINSEN K , L?UFER K , et al. Virtualization for computational scientists[J]. Computing in Science & Engineering, 2010,12(4): 52-60.
|
[12] |
邓谦 . 基于Hadoop的云计算安全机制研究[D]. 南京: 南京邮电大学, 2013. DENG Q . Research on Security Mechanism of Cloud Computing Based on Hadoop[D]. Nanjing: Nanjing University, 2013.
|
[13] |
ZHU H , CHEN H P . Adaptive failure detection VIA heartbeat under hadoop[A]. 2011 IEEE Asia-Pacific Services Computing Conference[C]. Jeju,Korea, 2011. 231-238.
|
[14] |
赵永利, 张杰 . OMNeT++与网络仿真[M]. 北京: 人民邮电出版社, 2012. ZHAO Y L , ZHANG J . OMNeT++and Network Simulation[M]. Beijing: Posts &Telecom Press 2012.
|