[1] |
Amazon Inc. Amazon elastic compute cloud (Amazon EC2)[EB/OL]. , 2011.
|
[2] |
CHOWDHURY N M M K , BOUTABA R . A survey of network virtu-alization[J]. Computer Networks, 2010,54(5):862-876.
|
[3] |
HASHIZUME K , ROSADO D G , FERNáNDEZ-MEDINA E , et al. An analysis of security issues for cloud computing[J]. Journal of Inter-net Services and Applications, 2013,4(1):1.
|
[4] |
JASTI A , SHAH P , NAGARAJ R , et al. Security in multi-tenancy cloud[C]//2010 IEEE International Carnahan Conference on Security Technology (ICCST). 2010:35-41.
|
[5] |
MIRKOVIC J , REIHER P . A taxonomy of DDoS attack and DDoS defense mechanisms[J]. ACM SIGCOMM Computer Communication Review, 2004,34(2):39-53.
|
[6] |
PENG T , LECKIE C , RAMAMOHANARAO K . Survey of network-based defense mechanisms countering the DoS and DDoS problems[J]. ACM Computing Surveys (CSUR), 2007,39(1):3.
|
[7] |
BHUYAN M H , KASHYAP H J , BHATTACHARYYA D K , et al. Detecting distributed denial of service attacks:methods,tools and fu-ture directions[J]. Computer Journal, 2013,57(4):537-556.
|
[8] |
FEINSTEIN L , SCHNACKENBERG D , BALUPARI R , et al. Statis-tical approaches to DDoS attack detection and response[C]//DARPA Information Survivability Conference and Exposition. 2003:303-314.
|
[9] |
YI F , YU S , ZHOU W , et al. Source-based filtering scheme against DDOS attacks[J]. International Journal of Database Theory and Ap-plication, 2008,1(1):9-20.
|
[10] |
CHOUHAN V , PEDDOJU S K . Packet monitoring approach to pre-vent DDoS attack in cloud computing[J]. International Journal of Computer Science and Electrical Engineering (IJCSEE) ISSN. 2013:2315-4209.
|
[11] |
GAVASKAR S , SURENDIRAN R , RAMARAJ D E . Three counter defense mechanism for TCP SYN flooding attacks[J]. International Journal of Computer Applications, 2010,6(6):0975-8887.
|
[12] |
RAI M K , MISHRA V S . Detection of UDP and HTTP anomalies on real time traffic based on NIDS using OURMON tool[J]. 2015.
|
[13] |
SHANNON C E . A mathematical theory of communication[J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2001,5(1):3-55.
|
[14] |
KUMAR K , JOSHI R C , SINGH K . A distributed approach using entropy to detect DDoS attacks in ISP domain[C]//2007 International Conference on Signal Processing,Communications and Networking.IEEE, 2007:331-337.
|
[15] |
DAVID J , THOMAS C . DDoS attack detection using fast entropy approach on flow-based network traffic[J]. Procedia Computer Science, 2015,50:30-36.
|
[16] |
XIANG Y , LI K , ZHOU W . Low-rate DDoS attacks detection and traceback by using new information metrics[J]. IEEE Transactions on Information Forensics and Security, 2011,6(2):426-437.
|
[17] |
BHUYAN M H , BHATTACHARYYA D K , KALITA J K . An empiri-cal evaluation of information metrics for low-rate and high-rate DDoS attack detection[J]. Pattern Recognition Letters, 2015,51:1-7.
|
[18] |
TAO Y , YU S . DDoS attack detection at local area networks using information theoretical metrics[C]//2013 12th IEEE International Conference on Trust,Security and Privacy in Computing and Commu-nications.IEEE, 2013:233-240.
|
[19] |
AIN A , BHUYAN M H , BHATTACHARYYA D K , et al. Rank corre-lation for low-rate DDoS attack detection:an empirical evaluation[J]. International Journal of Network Security, 2016,18(3):474-480.
|