35
Views
4
CrossRef citations to date
0
Altmetric
Articles

Diverse real-time attack traffic forecasting for cloud platforms

, &

References

  • Felix Lau, Stuart H. Rubin, Michael H. Smith and Ljiljana Trajkovic. “Distributed Denial of Service Attacks”. Systems, Man, and Cyber-netics, IEEE International Conference (2000).
  • “33% of businesses hit by DDoS attack in 2017, double that of 2016” [Online]. Available: https://www.techrepublic.com/article/33-of-businesses-hit-by-ddos-attack-in-2017-double-that-of-2016/
  • D. Dagon, C. Zou, and W. Lee, “Modeling botnet propagation using time zones,” in Proceedings of the 13th annualnetwork and distributed system security symposium(NDSS06), 2006.
  • C. Fachkha, E. Bou-Harb, A. Boukhtouta, S. Dinh, F. Iqbal, and M. Debbabi, “Investigating the dark cyberspace: Profiling, threat-based analysis and correlation,” in 7th International Conference on Risk and Securityof Internet and Systems (CRiSIS). IEEE, (2012).
  • S. Qibo, W. Shangguang, Y. Danfeng, and Y. Fangchun, “Arm-cpd: Detecting syn flooding attack by traffic prediction,” in 2nd IEEE International Conference on BroadbandNetwork Multimedia Technology, (2009).
  • H. Park, S.-O. D. Jung, H. Lee, and H. P. In, “Cyber weather forecasting: Forecasting unknown internet worms using randomness analysis,” in Information Securityand Privacy Research. Springer, (2012).
  • David, J., & Thomas, C. Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. Computers & Security, 82, 284-295 (2019). doi: 10.1016/j.cose.2019.01.002
  • Mcafee lab threat report. [Online]. Available: http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2015.pdf
  • Mumtaz, Majid, and Luo Ping. “Forty years of attacks on the RSA cryptosystem: A brief survey.” Journal of Discrete Mathematical Sciences and Cryptography 22.1: 9-29 (2019). doi: 10.1080/09720529.2018.1564201
  • Priyadarsini, P. L. K. “A survey on some applications of graph theory in cryptography.” Journal of Discrete Mathematical Sciences and Cryptography 18.3: 209-217 (2015). doi: 10.1080/09720529.2013.878819
  • Mehrnoosh Torabi, Mahmoud Reza Saybani, Shahaboddin Shamshirband, Amir Mosavi. “A hybrid clustering and classification technique for forecasting short-term energy consumption”. 27 June 2018 Environmental progress and Sustainable Energy
  • N. Park and W. H. Park, “Cyber threat prediction model using security monitoring system event,” in IT Convergenceand Security 2012. Springer, (2013).
  • Worldwide infrastructure security report. [ebook] arbornetworks. com: Arbor Networks. Available at: https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf [Accessed 17 Sep. 2017].
  • Worldwide infrastructure security report. [Online]. Available: https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf
  • Arora, A. S., Raja, L., & Bahl, B. Data Centric Security Approach: A Way to Achieve Security & Privacy in Cloud Computing ((2018)).
  • Arbor Networks, “Infrastructure Security Report,” http://tinyurl.com/ag6tht4, last accessed on April 2013 (2012).
  • Shojafar, M., & Sookhak, M. Internet of everything, networks, applications, and computing systems (IoENACS) (2019).
  • Kai Peng, Victor C. M. Leung, Qingjia Huang. “Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data”. IEEE Access Volume 6.
  • Bingyin Zhou, Ming Lu, Yonggang Wang, “Counting people using gradient boosted trees”. IEEE Information Technology, Networking, Electronic and Automation Control Conference (2016).
  • Borja Merino Febrero, INTECO. “Traffic Analysis with Wireshark”. [Online]. Available: http://www.inteco.es
  • Scikit-learn. [Online]. Available: http://scikit-learn.org/
  • Anaconda Documentation. [online] Available: https://docs.anaconda.com.
  • LEEa, C. K. M., LVb, Y., NGa, K. K. H., HOc, W., & CHOY, K. Taylor & Francis Group–International Journal of Production Research 56 (2018). International Journal of Production Research, 56, 2753-2768 (2018). doi: 10.1080/00207543.2017.1394592
  • Luo, X., Zhang, W., Bose, R., Li, H., & Chung, Q. B. Producing competitive advantage from an infrastructure technology: The case of cloud computing. Information Systems Management, 35(2), 147-160 (2018). doi: 10.1080/10580530.2018.1440732
  • D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, “Inferring internet denial-of-service activity,” ACM Transactions on Computer Systems (TOCS), (2006).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.