References: [1] Harshita. (2013). A survey of different types of security threats and its countermeasures.
[2] Computerweekly.com.
[3] Ponemon Institute/Symantic.com.
[4] Ionanidis, J., Bellovin, S. (2012). Implementing PushBack: Router-based Defense Against DDoS Attacks.
[5] Rao, R. (2007). On Scalable Attack Detection in the Network.
[6] Karerna., David. (2009). Scalable Network-Layer Defense Mechanism against Internet Bandwidth Flooding Attack.
[7] Lui, X. (2010). Preventing Internet Denial of Service from Inside Out.
[8] Bogdanoshi, M. (2011). Wireless Network Behavior under ICMP Flood DoS Attack and Mitigation Techniques.
[9] TELELINK. (2013). Corporate WAN Threats, IT Threats – Control Plane Attack.
[10] CSA, Security Guidance. (2014). Construction of digital campus security based cloud computing. |