Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers
暂无分享,去创建一个
[1] Christian Esposito,et al. Interconnecting Federated Clouds by Using Publish-Subscribe Service , 2013, Cluster Computing.
[2] Paul Watson,et al. Experiments Towards Adaptation of Concurrent Workflows , 2007, ECOWS 2007.
[3] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[4] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[5] L. Schwartz,et al. Sophisticated Denial of Service attacks aimed at application layer , 2012, 2012 ELEKTRO.
[6] Maciá-FernándezGabriel,et al. Mathematical model for low-rate DoS attacks against application servers , 2009 .
[7] Beniamino Di Martino,et al. An intrusion detection framework for supporting SLA assessment in Cloud Computing , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
[8] Francesco Palmieri,et al. Analyzing Local Strategies for Energy-Efficient Networking , 2011, Networking Workshops.
[9] Xiao Guo,et al. A queuing analysis for low-rate DoS attacks against application servers , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[10] Zhenyu Wu,et al. Energy Attack on Server Systems , 2011, WOOT.
[11] John McHugh,et al. Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? , 2008, ESORICS.
[12] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[13] Xiapu Luo,et al. On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.
[14] Francesco Palmieri,et al. Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[15] Massimiliano Rak,et al. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services , 2011, 2011 First International Conference on Data Compression, Communications and Processing.
[16] Francesco Palmieri,et al. Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..
[17] CastiglioneAniello,et al. A distributed approach to network anomaly detection based on independent component analysis , 2014 .
[18] Zhenyu Wu,et al. On Energy Security of Server Systems , 2012, IEEE Transactions on Dependable and Secure Computing.
[19] Gabriel Maciá-Fernández,et al. Mathematical Model for Low-Rate DoS Attacks Against Application Servers , 2009, IEEE Transactions on Information Forensics and Security.
[20] Aleksandar Kuzmanovic,et al. Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.
[21] Rocco Aversa,et al. Intrusion Detection in Cloud Computing , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[22] Nils Gruschka,et al. A survey of attacks on web services , 2009, Computer Science - Research and Development.
[23] Francesco Palmieri,et al. A distributed approach to network anomaly detection based on independent component analysis , 2014, Concurr. Comput. Pract. Exp..
[24] Angelos D. Keromytis,et al. Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction , 2009 .
[25] Massimiliano Rak,et al. Intrusion Tolerance of Stealth DoS Attacks to Web Services , 2012, SEC.
[26] Wanlei Zhou,et al. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..
[27] Gabriel Maciá-Fernández,et al. LoRDAS: A Low-Rate DoS Attack against Application Servers , 2007, CRITIS.
[28] Senthil Mani,et al. Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[29] Salvatore Venticinque,et al. mOSAIC-Based Intrusion Detection Framework for Cloud Computing , 2012, OTM Conferences.
[30] Anat Bremler-Barr,et al. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[31] Alessio Merlo,et al. Green-Aware Security : Towards a new Research Field , 2012 .
[32] Hossein Rouhani Zeidanloo,et al. Botnet Command and Control Mechanisms , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[33] Nils Gruschka,et al. SOA and Web Services: New Technologies, New Standards - New Attacks , 2007, Fifth European Conference on Web Services (ECOWS'07).
[34] Sven Dietrich,et al. P2P as botnet command and control: A deeper insight , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[35] Francesco Palmieri,et al. A botnet-based command and control approach relying on swarm intelligence , 2014, J. Netw. Comput. Appl..