|
[1] Prachi Deshpande, Aditi Aggarwal, S.C.Sharma, P.Sateesh Kumar, Ajith Abraham, “Distributed Port-Scan Attack in Cloud Environment”, 2013 Fifth International Conference on Computational Aspects of Social Networks, 12-14 Aug. 2013. [2] Damien Riquet, Gilles Grimaud, Michaël Hauspie, “Large-Scale Coordinated attacks: Impact on the Cloud Security”, International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 4-6 July 2012. [3] Preeti Mishra, Vijay Varadharajan, Uday Tupakula, Emmanuel S. Pilli, “A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection”, IEEE Communications Surveys & Tutorials, Vol. 21, pp. 686-728, 15 June 2018. [4] P.Deshpande, S. Sharrna, P. Kumar, “Deployment of Private Cloud: Go Through the Errors First” Proc. of Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013), Deharadun-India, Apr. 2013, pp. 638-641. [5] Mingphum Arunwan, Tanachad Laong, Kiattichai Atthayuwat, “Defensive Performance Comparison of Firewall Systems”, 2016 Management and Innovation Technology International Conference (MITicon), 12-14 Oct. 2016. [6] Sajad Shirali-Shahreza, Yashar Ganjali, “Protecting Home User Devices with an SDN-Based Firewall”, IEEE Transactions on Consumer Electronics, Vol. 64, pp. 92-100, Feb. 2018. [7] Mauro Soria, Retrived June 25,2019,from https://github.com/maurosoria/dirsearch [8] Sandro Gauci, Retrived June 25, 2019, from github.com/EnableSecurity/wafw00f [9] Gordon Lyon, Retrived June 25, 2019, from https://nmap.org [10] Guillaume Savary, Retrived June 25, 2019, from TCP series #1, https://accedian.com/enterprises/blog/diagnose-tcp-connection-setup-issues/ [11] Isabell Schmitt, Sebastian Schinzel, “WAFFle: Fingerprinting Filter Rules of Web Application Firewalls”, WOOT''12 Proceedings of the 6th USENIX conference on Offensive, August 8–12, 2011. [12] Wei Zhang, Shaohua Teng, Xiufen Fu, “Scan Attack Detection Based on Distributed Cooperative Model”, 2008 12th International Conference on Computer Supported Cooperative Work in Design, 16-18 April 2008. [13] lijiejie,Retrived June 26,2019,from www.lijiejie.com/iis-win8-3-shortname-brute [14] B. Prabadevi, N. Jeyanthi, “Distributed Denial of Service Attacks and its Effects on Cloud Environment”, The 2014 International Symposium on Networks, Computers and Communications, 28 July 2014. [15] Zohaib Hassan, Shahzeb, Roman Odarchenko, Sergiy Gnatyuk, Abnash Zaman, Masroor Shah, “Detection of Distributed Denial of Service Attacks Using Snort Rules in Cloud Computing & Remote Control Systems”, 2018 IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC), 16-18 Oct. 2018. [16] Opeyemi Osanaiye, Kim-Kwang Raymond Choo, Mqhele Dlodlo, "Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework", Journal of Network and Computer Applications, vol. 67, pp. 147, 2016. [17] Amazon Web Services, Inc, Retrived June 26, 2019, from https://docs.aws.amazon.com/zh_tw/waf/latest/developerguide/tutorials-4xx-blocking.html [18] Sung-Hwan Ahn, Nam-Uk Kim, Tai-Myoung Chung, “Big Data Analysis System Concept for Detecting Unknown Attacks”, 16th International Conference on Advanced Communication Technology, 16-19 Feb. 2014. [19] Siti Hawa Mokhtar, Gopinath Muruti, Zul-Azri Ibrahim, Fiza Abdul Rahim, Hairoladenan Kasim, "A Review of Evidence Extraction Techniques in Big Data Environment", Smart Computing and Electronic Enterprise (ICSCEE) 2018 International Conference on, pp. 1-7, 2018. [20] M. Mazhar Rathore, Faisal Saeed, Abdul Rehman, Anand Paul, Alfred Daniel, "Intrusion Detection using Decision Tree Model in High-Speed Environment", Soft-computing and Network Security (ICSNS) 2018 International Conference on, pp. 1-4, 2018.
|