Kiểm Soát Lưu Lượng Web và Ngăn Chặn Các Cuộc Tấn Công DoS/DDoS Trong Các Mạng Với Giải Pháp Bảo Mật Cổng Proxy Dựa Trên Phần Cứng Mở
Tóm tắt
Từ khóa
#IP SLA #proxy #Hot-IP #DoS/DDoS attacksTài liệu tham khảo
xuan, 0, Detecting Application Denial-of-Service Attacks: A Group- Testing-Based Approach, IEEE Trans Parallel Distrib Syst, 21, 1203, 10.1109/TPDS.2009.147
ristic, 2010, ModSecurity Handbook The Complete Guide to the Popular Open Source Web Application Firewall
kassim, 2012, A survey: Bandwidth management in an IP based network, World Academy of Science Engineering and Technology, 62, 356
haghpassand, 2015, Web-based security and filtering system for inbound/outbound communications with proxy chaining
chrysostomou, 2016, Congestion control in computer networks using fuzzy logic, Proceedings of the 10th WSEAS International Conference on Communications ICCOM, 6, 551
abualhaj, 2016, FLRED: an efficient fuzzy logic based network congestion control method, Neural Comput Appl
alessandro, 2005, The AVISPA tool for the automated validation of internet security protocols and applications, Proceedings of the 17th International Conference on Computer Aided Verification, 281
kumar, 2015, Network Security Threats and Protection Models
rajendran, 2018, Detection of DoS attacks in cloud networks using intelligent rule based classification system, Clust Comput
chinh, 2014, Early detection and limitation Hot-IPs using Non-Adaptive Group Testing and dynamic firewall rules, Computing Management and Telecommunications (ComManTel) 2014 International Conference on IEEE
roozbahani, 2015, Security solutions against computer networks threats, International Journal of Advanced Networking and Applications, 7, 2576
gaigole, 2015, The Study of Network Security with Its Penetrating Attacks and Possible Security Mechanisms, Int J Comput Sci Mob Comput, 45, 728
metwally, 2005, Efficient computation of frequent and top-k elements in data streams, International Conference on Database Theory, 389
dayanandam, 2013, Password Based Scheme and Group Testing for Defending Ddos Attacks, International Journal of Network Security & Its Applications (IJNSA), 5