REFERENCES
- Blazic, N., Basicevic, I., Pilipovic, M., Chen, Z., & Kiat, Y. C. (2018, May). Implementation of SYN flood attack simulator in NS-3. In 2018 Zooming Innovation in Consumer Technologies Conference (ZINC) Novi Sad, Serbia (pp. 110–113). IEEE.
- Dou, W., Chen, Q., & Chen, J. (2013). A confidence-based filtering method for DDoS attack defense in cloud environment. Future Generation Computer Systems, 29(7), 1838–1850. https://doi.org/10.1016/j.future.2012.12.011
- Haddadi, M., & Beghdad, R. (2018). Dos-ddos: Taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment. EDPACS, 57(5), 1–26. https://doi.org/10.1080/07366981.2018.1453101
- Haddadi, M., & Beghdad, R. (2020). A confidence interval based filtering against DDoS attack in cloud environment: A confidence interval against DDoS attack in the cloud. International Journal of Information Security and Privacy (IJISP), 14(4), 42–56. https://doi.org/10.4018/IJISP.2020100103
- Henderson, T. R., Lacage, M., Riley, G. F., Dowell, C., & Kopena, J. (2008). Network simulations with the ns-3 simulator. SIGCOMM Demonstration, 14(14), 527 http://conferences.sigcomm.org/sigcomm/2008/papers/p527-hendersonA.pdf.
- Mark shuttleworth. (21 January 2021). https://ubuntu.com/download/desktop
- Mendel Rosenblum & Diane Greene. (9 January 2021). https://www.vmware.com/products/workstation-player/workstation-player-evaluation.html
- Nur, A. Y., & Tozal, M. E. (2018). Record route IP traceback: Combating DoS attacks and the variants. Computers & Security, 72, 13–25. https://doi.org/10.1016/j.cose.2017.08.012
- Pandey, V. C., Peddoju, S. K., & Deshpande, P. S. (2018). A statistical and distributed packet filter against DDoS attacks in Cloud environment. Sādhanā, 43(3), 1–9. https://doi.org/10.1007/s12046-018-0800-7
- RFC 791. (9 March 2020). https://tools.ietf.org/html/rfc791
- Savage, S., Wetherall, D., Karlin, A., & Anderson, T. (2001). Network support for IP traceback. IEEE/ACM Transactions on Networking, 9(3), 226–237. https://doi.org/10.1109/90.929847
- Song, D. X., & Perrig, A. (2001, April). Advanced and authenticated marking schemes for IP traceback. In Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213) Anchorage, AK, USA (Vol.2, pp. 878–886). IEEE.
- Wang, H., Jin, C., & Shin, K. G. (2007). Defense against spoofed IP traffic using hop-count filtering. IEEE/ACM Transactions on Networking, 15(1), 40–53. https://doi.org/10.1109/TNET.2006.890133
- Yaar, A., Perrig, A., & Song, D. (2005, March). FIT: Fast internet traceback. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies Miami, FL, USA. (Vol.2, pp. 1395–1406). IEEE.