Open Access
Issue
E3S Web Conf.
Volume 125, 2019
The 4th International Conference on Energy, Environment, Epidemiology and Information System (ICENIS 2019)
Article Number 21004
Number of page(s) 6
Section Business Intelligence
DOI https://doi.org/10.1051/e3sconf/201912521004
Published online 28 October 2019
  1. Y, Qiao, Yu, F. Richard, Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing, IEEE Communications Magazine 53(2), 52-59 (2015) [Google Scholar]
  2. A.H. Paul, Industrial-Strength Firewall Topologies, Information Systems Security 14(2), 20–26 (2005) [CrossRef] [Google Scholar]
  3. Z. Xiao, Y. Xiao, Security and Privacy in Cloud Computing, IEEE Commun. Surveys & Tutorials 15(2), 843–59 (2013) [CrossRef] [Google Scholar]
  4. S.T. Zargar, J. Joshi, D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials 15(2), 2046-2069 (2013) [CrossRef] [Google Scholar]
  5. R.V. Deshmukh, K.K. Devadkar, Understanding DDoS Attack & Its Effect in Cloud Environment, Procedia Comput. Sci 49(2), 202–210 (2015) [Google Scholar]
  6. Radware Ltd, DDOs Attack Survival Handbook, Chicago: Radware, CSUSB (2013) [Google Scholar]
  7. X. Geng, Y. Huang, A.B. Whinston, Defending Wireless Infrastructure Against the Challenge of DDoS Attacks, Mobile Networks and Applications 7(2), 213-223 (2002) [CrossRef] [Google Scholar]
  8. R. Mehta, Distributed Denial of service Attacks on Cloud Environment, Int. J. Adv. Res. Comput. Sci. 8(2), 2204–2206 (2017) [Google Scholar]
  9. B. Santhi, G.J. Bharathi, Study on Distributed Denial-of-Service Attack, Research Journal of Applied Sciences 4(2), 1366-1370 (2012) [Google Scholar]
  10. Y. Xie, S.Z. Yu, Monitoring the Application-layer DDoS Attacks for Popular Websites, IEEE/ACM Transactions on Networking 17(2), 15-25 (2009) [CrossRef] [Google Scholar]
  11. S.T. Zargar, J. Joshi, D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials 15(2), 2046-2069 (2013) [CrossRef] [Google Scholar]
  12. S. Patil, S. Chaudhari, DoS Attack Prevention Technique in Wireless Sensor Networks, Procedia Computer Science 79, 715–721 (2016) [Google Scholar]
  13. J. Arzamendia, F. Lopez-Pires, Distributed Denial of Service Attacks in Cloud Computing: A Literature Review, Int. J. Enhanc. Res. Manag. Comput. Appl. (2016) [Google Scholar]
  14. K.H. Alotaibi, Threat in Cloud-Denial of Service ( DoS ) and Distributed Denial of Service ( DDoS ) Attack , and Security Measures, J. Emerg. Trends Comput. Inf. Sci. 6(2), 241–244 (2015) [Google Scholar]
  15. S. Ansari, S.G. Rajeev, H.S. Chandrashekar, Tips on How to Get the Network Interface, Internetworking Res. Exp., 17–19 (2003) [Google Scholar]
  16. S. Schuckers, Spoofing and Anti-Spoofing Measures, Information Security technical report 7(2), 56-62 (2002) [CrossRef] [Google Scholar]
  17. M. Darwish, A. Ouda; L.F. Capretz, Cloud-based DDoS Attacks and Defenses, International Conference on Information Society (i-Society 2013) IEEE, 67-71 (2013) [Google Scholar]
  18. M. Monika, Y. Singh, A Review: DoS and DDoS Attacks, International Journal of Computer Science and Mobile Computing 4(2), 260-265 (2015) [Google Scholar]
  19. M. Darwish, A. Ouda; L.F. Capretz, Cloud-based DDoS Attacks and Defenses, International Conference on Information Society (i-Society 2013) IEEE, 67-71 (2013) [Google Scholar]
  20. E. Alomari, et al., Botnet-Based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art, arXiv preprint arXiv:1208.0403 (2012) [Google Scholar]
  21. G.J. Han, W. Shen, Q.D. Trung, et al., A Proposed Security Scheme Against Denial of Service Attacks in Cluster-Based Wireless Sensor Networks, Security and Communication Networks (2011) [Google Scholar]
  22. D. Raymond, S.F. Midkiff, Denial-of-service in Wireless Sensor Networks: Attacks and Defenses, IEEE Pervasive Computing 7(2), 74-81 (2008) [Google Scholar]
  23. M. Li, I. Koutsopoulos, Network Defense Policies in Wireless Sensor Networks, Network 9(2), 1307–1315 (2010) [Google Scholar]
  24. Z. Cao, X. Zhou, M. Xu X, et al., Enhancing base station security against DoS attacks in wireless sensor networks, IEEE Wireless Communications Networking and Mobile Computing. 1-4 (2007) [Google Scholar]
  25. C. Douligeris, A. Mitrokotsa. DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks 44(2), 643–666 (2004) [CrossRef] [Google Scholar]
  26. S. Patil, S. Chaudhari, DoS Attack Prevention Technique in Wireless Sensor Networks, Procedia Computer Scienc e 79, 715–721 (2016) [CrossRef] [Google Scholar]
  27. N.P. Patel, R.G. Patel, D.R. Patel, Packet Sniffing : Network Wiretapping Packet Sniffing : Network Wiretapping, Researchgate (2014) [Google Scholar]
  28. J. Carr, Snort: Open source network intrusion prevention, Esecurity Planet (2007) [Google Scholar]
  29. Y, Yu, Y. Li, Y. Deng, Study on Linkage Mechanism of IDS and Firewall Based on SNMP Protocol, Procedia Engineering 29, 3424–3428 (2012) [Google Scholar]
  30. M. Imran, A.A. Alghamdi, B. Ahmad, Role of firewall Technology in Network Security; IJIACS 4, 3–6, (2015) [Google Scholar]
  31. Q.-X. Wu, The Research and Application of Firewall based on Netfilter, Phys. Procedia 25, 1231–1235 (2012) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.