[1] |
CHANG R K C . Defending against flooding-based distributed denial-of-service attacks:a tutorial[J]. IEEE Communications Magazine, 2002,40(10): 42-51.
|
[2] |
CHONKA A , XIANG Y , ZHOU W L ,et al. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks[J]. Journal of Network and Computer Applications, 2011,34(4): 1097-1107.
|
[3] |
YU S , TIAN Y H , GUO S ,et al. Can we beat DDoS attacks in clouds?[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(9): 2245-2254.
|
[4] |
GIRMA A , GARUBA M , LI J ,et al. Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect ddos attacks on cloud computing environment[C]// 12th International Conference on Information Technology-New Generations. 2015: 212-217.
|
[5] |
OSANAIYE O A , DLODLO M . TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment[C]// EUROCON 2015 International Conference on Computer as a Tool. 2015: 1-6.
|
[6] |
LIU Z G , YIN X C , LEE H J . A new network flow grouping method for preventing periodic shrew DDoS attacks in cloud computing[C]// 2016 18th International Conference on Advanced Communication Technology (ICACT). 2016: 66-69.
|
[7] |
韩志杰, 段晓阳 . 基于云计算平台的防御拒绝服务攻击方法[J]. 信息化研究, 2011,37(5): 67-69.
|
|
HAN Z J , DUAN X Y . Defense strategy of denial of service attacks based on cloud computing platform[J]. Informatization Research, 2011,37(5): 67-69.
|
[8] |
韩伟 . 基于 Hadoop 云计算平台下 DDoS 攻击防御研究[D]. 太原:太原科技大学, 2011.
|
|
HAN W . DDoS attack defense research based on Hadoop cloud computing platform[D]. Taiyuan:Taiyuan University of Science and Technology, 2011.
|
[9] |
吴志军, 崔奕, 岳猛 . 基于虚拟散列安全访问路径VHSAP的云计算路由平台防御DDoS攻击方法[J]. 通信学报, 2015,36(1): 1-8.
|
|
WU Z J , CUI Y , YUE M . VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms[J]. Journal on Communications, 2015,36(1): 1-8.
|
[10] |
KEROMYTIS A D , MISRA V , RUBENSTEIN D . SOS:secure overlay services[C]// The 2002 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications. 2002.
|
[11] |
KEROMYTIS A D , MISRA V , RUBENSTEIN D . SOS:an architecture for mitigating DDoS attacks[J]. IEEE Journal on Selected Areas in Communications, 2004,22(1): 176-187.
|
[12] |
卢国强 . 云计算环境下的泛联路由平台[J]. 信息安全与技术, 2010(8): 106-108.
|
|
LU G Q . Tum routing platform in cloud computing[J]. Information Security and Technology, 2010(8): 106-108.
|
[13] |
STOICA I , MORRIS R,LIBEN-NOWELL D ,et al. Chord:a scalable peer-to-peer lookup protocol for internet applications[J]. IEEE/ACM Transactions on Networking, 2003,11(1): 17-32.
|
[14] |
刘孟 . 云环境下 DDoS 攻击攻防体系及其关键技术研究[D]. 南京:南京大学, 2016.
|
|
LIU M . Architecture of DDoS attacks defense in cloud environment and its key technology[D]. Nanjing:Nanjing University, 2016.
|
[15] |
ZOLTAN F , PETER F , STEFAN L ,et al. Performance analysis of IPsec in mobile IPv6 scenarios[C]// The 16th IST Mobile and Wireless Communication Summit. 2007: 1-5.
|
[16] |
KHALED S , KHALID E , RAOUF B . Performance modeling and analysis of network firewalls[J]. IEEE Transactions on Network and Service Management, 2012,9(1): 12-21.
|
[17] |
LIU M , DOU W C , YU S ,et al. A decentralized cloud firewall framework with resources provisioning cost optimization[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(3): 621-631.
|
[18] |
MOREIN W G , STAVROU A , COOK D L ,et al. Using graphic turning tests to counter automated DDoS attacks against Web servers[C]// The 10th ACM Conference on Computer and Communications Security. 2003: 8-19.
|
[19] |
ANGELOS S , DEBRA L C , WILLIAM G M ,et al. WebSOS:an overlay-based system for protecting Web servers from denial of service attacks[J]. Journal of Computer Networks, 2005,48(5): 781-807.
|