References: [1] Osanaiye, O., Choo, K.R., Dlodlo, M. (2016). Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework, Journal of Network and Computer Applications, vol. 67, p 147-165, May 2016. [2] Prasad, K., Reddy, A., Rao, K. (2014). DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey, Global Journal of Computer Science and Technology: (E) Network, Web & Security, 14 (7), Ver. 1.0, p 15-32, 2014. [3] Wang, B., Zheng, Y., Lou, W., Hou, Y. T. (2015). DDoS Attack Protection in the Era of Cloud Computing and Software- Defined Networking, Computer Networks, 81, p 308-319, 2015. [4] Nunes, I., Schardong, F., Schaeffer-Filho, A. (2017). BDI2DoS: An Application Using Collaborating BDI Agents to Combat DDoS Attacks, Journal of Network and Computer Applications, vol. 84, p 14-24, 2017. [5] Anstee, D., Bowen, P., Chui, C.F., Sockrider, G. (2017). Worldwide Infrastructure Security Report, Arbor Networks Special Report, Vol. XII, Arbor Networks, 2017. (www.arbornetworks.com) [6] Radware, DDoS Handbook, 2015. [7] Shameli-Sendi, A., Pourzandi, M., Fekih-Ahmed, M., Cheriet, M. (2015). Taxonomy of Distributed Denial of Service Mitigation Approaches for Cloud Computing, Journal of Network and Computer Applications, vol. 58, p 165-179, 2015. [8] Dzurenda, P., Martinasek, Z., Malina, L. (2015). Network Protection Against DDoS Attacks, Intern. Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems, 4 (1), p 8-14, 2015. [9] Zhou, W., Jia, W., Wen, S., Xiang, Y., Zhou, W. (2014). Detection and Defense of Application-Layer DDoS Attacks in Backbone Web Traffic, Future Generation Computer Systems, vol. 38, p 36-46, 2014. [10] Radware, DefensePro User Guide, January 2016. [11] Berry, I., Roman, T., Adams, L., Pasnak, J.P., Conner, J., Scheck, R.. Braun, A. (2017). The Cacti Manual, The Cacti Group, 2017. |