Diverse real-time attack traffic forecasting for cloud platforms

作者: Amandeep Singh Arora , Barkha Bahl , Linesh Raja

DOI: 10.1080/09720529.2019.1638579

关键词: Computer securityDenial-of-service attackCloud computingIdentification (information)Computer science

摘要: AbstractRapidly mounting Distributed Denial of Service bouts is a fatal menace to cloud platforms. Automatic exposure and mitigation techniques are primary defense mechanisms. Identification att...

参考文章(15)
David Dagon, Cliff Changchun Zou, Wenke Lee, Modeling Botnet Propagation Using Time Zones. network and distributed system security symposium. ,(2006)
Neo Park, Won Hyung Park, Cyber Threat Prediction Model Using Security Monitoring System Event international conference on it convergence and security, icitcs. pp. 233- 239 ,(2013) , 10.1007/978-94-007-5860-5_27
Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In, Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis information security conference. pp. 376- 387 ,(2012) , 10.1007/978-3-642-30436-1_31
Claude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi, Investigating the dark cyberspace: Profiling, threat-based analysis and correlation conference on risks and security of internet and systems. pp. 1- 8 ,(2012) , 10.1109/CRISIS.2012.6378947
David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage, Inferring Internet denial-of-service activity ACM Transactions on Computer Systems. ,vol. 24, pp. 115- 139 ,(2006) , 10.1145/1132026.1132027
Sun Qibo, Wang Shangguang, Yan Danfeng, Yang Fangchun, ARM-CPD: Detecting SYN flooding attack by traffic prediction 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology. pp. 443- 447 ,(2009) , 10.1109/ICBNMT.2009.5348532
Silva Adriana, None, Distributed denial of service attacks systems man and cybernetics. ,vol. 3, pp. 2275- 2280 ,(2000) , 10.1109/ICSMC.2000.886455
P.L.K. Priyadarsini, A Survey on some Applications of Graph Theory in Cryptography Journal of Discrete Mathematical Sciences and Cryptography. ,vol. 18, pp. 209- 217 ,(2015) , 10.1080/09720529.2013.878819
C.K.M. Lee, Yaqiong Lv, K.K.H. Ng, William Ho, K.L. Choy, Design and application of Internet of things-based warehouse management system for smart logistics International Journal of Production Research. ,vol. 56, pp. 2753- 2768 ,(2018) , 10.1080/00207543.2017.1394592
Kai Peng, Victor C. M. Leung, Qingjia Huang, Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data IEEE Access. ,vol. 6, pp. 11897- 11906 ,(2018) , 10.1109/ACCESS.2018.2810267