Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Saman Taghavi Zargar, James Joshi and David Tipper. (2013). A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, p1-24.
    2. Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita. (2012). Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions. The Computer Journal, p1-20.
    3. Hossein Rouhani Zeidanloo, Mohammad Jorjor Zadeh shooshtari, Payam Vahdani Amoli, M. Safari and Mazdak Zamani. (2010). A Taxonomy of Botnet Detection Techniques. IEEE , p1-5.
    4. Moti Geva, Amir Herzberg and Yehoshua Gev. (2013). Bandwidth Distributed Denial of Service: Attacks and Defenses. IEEE. 10, p1-10.
    5. Chenfeng Vincent Zhou, Christopher Leckie and Shanika Karunasekera. (2010). A survey of coordinated attacks and collaborative intrusion detection. Elsevier, p1 2 4 – 1 4 0.
    6. Christian Rossow. (2014). Amplification Hell: Revisiting Network Protocols for DDoS Abuse. Internet Society, p1-15
    7. Thomas Locher, DavidMysicka, Stefan Schmid, and Roger Wattenhofer. (2010). Poisoning the Kad Network. Springer-Verlag Berlin Heidelberg , p195–206.
    8. Kai Hwang and Deyi Li. (2010). Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE , p1-9.
    9. Scott C.-H. Huang, David MacCallum and Ding-Zhu Du. (2010). Network Security. Springer , p1-284
    10. Gianluca Ciccarelli and Renato Lo Cigno. (2011). Collusion in Peer-to-Peer Systems. Computer Networks. 55 , p3517–3532
    11.  MinJi Kim, Luısa Lima, Fang Zhao, Joao Barros, Muriel Medard, Ralf Koetter, Ton Kalker and Keesook J. Han. (2009). On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks. IEEE , p1-26.
    12. Hossein Rouhani Zeidanloo, Azizah Bt Manaf, Payam Vahdani, Farzaneh Tabatabaei, Mazdak Zamani. (2010). Botnet Detection Based on Traffic Monitoring. 201O International Conference on Networking and Information Technology, p1-5.
    13. Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang. (2012). Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. 23 (6), p1-8.
    14. Jerome Francois, Issam Aib and Raouf Boutaba, Fellow. (2014). FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks. IEEE , p1-15
    15. Z. Jin, S. Anand and K. P. Subbalakshmi. (2010). Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks. IEEE, p1-5
    16. Sabu M.Thampi , Albert Y.Zomaya, Thorsten Strufe, Jose M.Alcaraz Calero and Tony Thomas(2012).Recent Trends in Computer Networks and Distributed Systems Security , International Conference, SNDS 2012, Trivandrum.
    17. B.V.V.S. Prasad, Multicasting in MANET’s Through Scalable Mobility – Aware Virtual Tree Based Geographic routing Protocol, Voluem 4, Issue 1, January 2013. ISSN: 2229 – 5518

Recent Article