Have a personal or library account? Click to login
Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment Cover

Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment

Open Access
|Jul 2015

References

  1. 1. https://www.cloudflare.com/under-attack (accessed on 1 December 2014)
  2. 2. http://www.thedailybeast.com/articles/2010/12/11/hackers-10-most-famous-attacks-wormsand-ddos-takedowns.html (accessed on 1 December 2014)
  3. 3. Abdul-Rahman, A., S. Hailes. Using Recommendations for Managing Trust in Distributed Systems. - In: Proc. of IEEE Malaysia International Conference on Communication (MICC’97), 1997.
  4. 4. Liu, B., Z. Yua. Incorporating Social Networks and User Opinions for Collaborative Recommendation: Local Trust Network Based Method. - In: Proc. of the Workshop on Context-Aware Movie Recommendation, ACM, 2010, pp. 53-56.
  5. 5. Zacharia, G. Trust Management Through Reputation Mechanisms, Workshop in Deception, Fraud and Trust in Agent Societies. - In: Third International Conference on Autonomous Agents (Agents’99), ACM, 1999.
  6. 6. Eschenauer, L., V. D. Gligor, J. Bara. On Trust Establishment in Mobile Ad Hoc Networks. - Security Protocols Springer, 2004, pp. 47-66.10.1007/978-3-540-39871-4_6
  7. 7. Iyengar, N. C. Sriman Narayana, Gopinath Ganapathy, P. C. Mogan Kumar, Ajith Abraham. A Multilevel Thrust Filtration Defending Mechanism Against Ddos Attacks in Cloud Computing Environment. - International Journal of Grid and Utility Computing, Vol. 5, 2014, No 4, pp. 236-248.10.1504/IJGUC.2014.065384
  8. 8. Jeyanthi, N., N. C. S. N. Iyengar. Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment. - International Journal of Communication Networks and Information Security, Vol. 4, 2012, No 3, pp. 163-173.10.17762/ijcnis.v4i3.238
  9. 9. http://www.opnet.com/news/press_releases/pr-2010/OPNET-Introduces-Cloud-Readiness-Service-pr.html (accessed on 1 December 2014)
  10. 10. Jeyanthi, N., N. C. S. N. Iyengar, P. C. Mogan Kumar, A. Kannamma l. An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment. - International Journal of Communication Networks and Information Security, Vol. 5, 2013, No 2, pp. 110-119.10.17762/ijcnis.v5i2.367
  11. 11. http://www.opnet.com./services/brochures/OPNET_CloudReadiness.pdf (accessed on 1 December 2014)
  12. 12. Jeyanthi, N., C. Iyengar. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. - Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60. 10.2478/cait-2013-0005
DOI: https://doi.org/10.1515/cait-2015-0033 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 119 - 140
Published on: Jul 3, 2015
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2015 N. Ch. S. N. Iyengar, Gopinath Ganapathy, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.