Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 66, 2022 - Issue 4
91
Views
0
CrossRef citations to date
0
Altmetric

REFERENCES

  • Blazic, N., Basicevic, I., Pilipovic, M., Chen, Z., & Kiat, Y. C. (2018, May). Implementation of SYN flood attack simulator in NS-3. In 2018 Zooming Innovation in Consumer Technologies Conference (ZINC) Novi Sad, Serbia (pp. 110–113). IEEE.
  • Dou, W., Chen, Q., & Chen, J. (2013). A confidence-based filtering method for DDoS attack defense in cloud environment. Future Generation Computer Systems, 29(7), 1838–1850. https://doi.org/10.1016/j.future.2012.12.011
  • Haddadi, M., & Beghdad, R. (2018). Dos-ddos: Taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment. EDPACS, 57(5), 1–26. https://doi.org/10.1080/07366981.2018.1453101
  • Haddadi, M., & Beghdad, R. (2020). A confidence interval based filtering against DDoS attack in cloud environment: A confidence interval against DDoS attack in the cloud. International Journal of Information Security and Privacy (IJISP), 14(4), 42–56. https://doi.org/10.4018/IJISP.2020100103
  • Henderson, T. R., Lacage, M., Riley, G. F., Dowell, C., & Kopena, J. (2008). Network simulations with the ns-3 simulator. SIGCOMM Demonstration, 14(14), 527 http://conferences.sigcomm.org/sigcomm/2008/papers/p527-hendersonA.pdf.
  • Mark shuttleworth. (21 January 2021). https://ubuntu.com/download/desktop
  • Mendel Rosenblum & Diane Greene. (9 January 2021). https://www.vmware.com/products/workstation-player/workstation-player-evaluation.html
  • Nur, A. Y., & Tozal, M. E. (2018). Record route IP traceback: Combating DoS attacks and the variants. Computers & Security, 72, 13–25. https://doi.org/10.1016/j.cose.2017.08.012
  • Pandey, V. C., Peddoju, S. K., & Deshpande, P. S. (2018). A statistical and distributed packet filter against DDoS attacks in Cloud environment. Sādhanā, 43(3), 1–9. https://doi.org/10.1007/s12046-018-0800-7
  • RFC 791. (9 March 2020). https://tools.ietf.org/html/rfc791
  • Savage, S., Wetherall, D., Karlin, A., & Anderson, T. (2001). Network support for IP traceback. IEEE/ACM Transactions on Networking, 9(3), 226–237. https://doi.org/10.1109/90.929847
  • Song, D. X., & Perrig, A. (2001, April). Advanced and authenticated marking schemes for IP traceback. In Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213) Anchorage, AK, USA (Vol.2, pp. 878–886). IEEE.
  • Wang, H., Jin, C., & Shin, K. G. (2007). Defense against spoofed IP traffic using hop-count filtering. IEEE/ACM Transactions on Networking, 15(1), 40–53. https://doi.org/10.1109/TNET.2006.890133
  • Yaar, A., Perrig, A., & Song, D. (2005, March). FIT: Fast internet traceback. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies Miami, FL, USA. (Vol.2, pp. 1395–1406). IEEE.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.