References
- Abliz, M. (2011). Internet denial of service attacks and defense mechanisms (Tech. Rep. TR-11-178). Pittsburgh: University of Pittsburgh.
- Alam, M. F. (2014). Application layer Ddos a practical approach & mitigation techniques. Retrieved from https://conference.apnic.net/data/37/l7ddos_apricot-_1393257782.pdf.
- Arbor, N. (2014). Worldwide infrastructure security report, volume ix. Retrieved from https://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf
- Carl, G., Kesidis, G., Brooks, R. R., & Rai, S. (2006). Denial-of-service attack-detection techniques. Internet Computing, IEEE, 10(1), 82–89. doi: 10.1109/MIC.2006.5
- Chauhan, A., Mishra, G., & Kumar, G. (2012). Survey on data mining techniques in intrusion detection. Saarbrücken, Germany: Lap Lambert Academic Publishing.
- Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44(5), 643–666. doi: 10.1016/j.comnet.2003.10.003
- Durcekova, V., Schwartz, L., & Shahmehri, N. (2012). Sophisticated denial of service attacks aimed at application layer. ELEKTRO, Rajeck Teplice, Slovakia (pp. 55–60). IEEE.
- Gupta, V., Krishnamurthy, S., & Faloutsos, M. (2002). Denial of service attacks at the mac layer in wireless ad hoc networks. MILCOM 2002. Proceedings, Vol. 2, Anaheim, CA (pp. 1118–1123). IEEE.
- Hoffman, K., Zage, D., & Nita-Rotaru, C. (2009). A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR), 42(1), 1–34. doi: 10.1145/1592451.1592452
- Infosec. (2014). Layer seven DDoS attacks. Retrieved August 20, 2014, from http://resources.infosecinstitute.com/layer-seven-ddos-attacks/
- Jain, H. (2008). 10-ddos-mitigation-techniques. Retrieved from http://www.slideshare.net/intruguard/10-ddos-mitigation-techniques-presentation
- Kumar, G. (2004). Understanding denial of service (DoS) attacks using OSI reference model. International Journal of Education and Science Research, 1(5), 10–17.
- Kumar, G., & Kumar, K. (2014). Network security - an updated perspective. Systems Science & Control Engineering: An Open Access Journal, 2(1), 325–334. doi: 10.1080/21642583.2014.895969
- Kumar, G., Kumar, K., & Sachdeva, M. (2010a). An empirical comparative analysis of feature reduction methods for intrusion detection. International Journal of Information and Telecommunication Technology, 1(1), 44–51.
- Kumar, G., Kumar, K., & Sachdeva, M. (2010b). The use of artificial intelligence based techniques for intrusion detection: a review. Artificial Intelligence Review, 34(4), 369–387. doi: 10.1007/s10462-010-9179-5
- Miller, A. (2014). What is a layer 7 DDoS attack?. Retrieved from http://ddosattackprotection.org/blog/layer-7-ddos-attack/
- Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39–53. doi: 10.1145/997150.997156
- Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications, 36(1), 42–57. doi: 10.1016/j.jnca.2012.05.003
- Nsfocus. (2014). Introduction to DDoS attack. Retrieved July 28, 2014, from https://en.nsfocus.com/…/DDoS%20FAQ/What%20is-%20DDoS%20Attack.pdf
- Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Computing Surveys (CSUR), 39(1), 1–42. doi: 10.1145/1216370.1216373
- Popeskic, V. (2011). Telnet attacks ways to compromise remote connections. Retrieved July 28, 2014, from http://howdoesinternetwork.com/2011/telnet-attacks
- Prolexic: Q1 2014 global ddos attack report (2014a). Retrieved July 28, 2014, from http://www.prolexic.com/knowledge-center-ddos-attack-report-2014-q1.html
- Prolexic: Q2 2014 global ddos attack report (2014b). Retrieved July 28, 2014, from http://www.prolexic.com/knowledge-center-ddos-attack-report-2014-q2.html
- Rao, S., & Rao, S. (2011). Denial of service attacks and mitigation techniques: Real time implementation with detailed analysis. SANS Institute Infosec Reading Room Sep, 11.
- Saafan, A. (2014). Distributed denial of service attacks: Explain nation, classification and suggested solutions. Retrieved July 28, 2014, from http://www.intelligentexploit.com/articles/DDoS-Attacks-explaination-classification-and-suggested-solutions.pdf
- Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14–20. doi: 10.1016/S1353-4858(12)70016-8
- Verizon: The 2013 Data Breach Investigations Report (2013). Retrieved September 23, 2013, from www.verizonenterprise.com/resources/reports/rp_data-_breach-investigations-report-2013_en_xg.pdf
- Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao, X. S. Shen, & D.-Z. Du (Eds.), Wireless Network Security (pp. 103–135). New York, NY: Springer.
- Yeung, K. H., Fung, D., & Wong, K. Y. (2008). Tools for attacking layer 2 network infrastructure. Proceedings of the international multiconference of engineers and computer scientists, Vol. 2, Hong Kong (pp. 1–6). Citeseer.