[1] Jansen W, Timothy G. Security Guidance for Critical Areas of Focus in Cloud Computing v3.0[M]. Phoenix: Cloud Security Alliance, 2011.
[2] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83.
Feng Dengguo, Zhang Min, Zhang Yan, et al. Study on Cloud Computing Security[J]. Journal of Software, 2011, 22(1): 71-83.
[3] Modi C, Patel D, Borisanyia B, et al. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing [J]. Journal of Supercomputing, 2013, 63(2): 561-592.
[4] Choi H, Lee H. Identifying Botnets by Capturing Group Activities in DNS Traffic [J]. Computer Networks, 2012, 56(1): 20-33.
[5] Hunt N, Bergan T, Ceze L, et al. DDOS: Taming Nondeterminism in Distributed Systems [C]//Proceedings of the 18th International Conference on Architectural Support for Programming Languages and oPerating Systems. New York: ACM, 2013: 499-508.
[6] Botezatu B. Anatomy of a Botnet [R]. Burlington: Arbor Networks, 2010.
[7] Arbor Networks. 8th Annual Worldwide Infrastructure Security Report [R]. Burlington: Arbor Networks, 2013.
[8] Studer A, Perrig A. The Coremelt Attack [C]//Lectures Notes in Computer Science. Heidelberg: Springer, 2009: 37-52.
[9] Liu Jiuxing, Huang Wei, Abali B, et al. High Performance VMM-bypass I/O in Virtual Machines [C]//Proceedings of the Annual Conference on USENIX: 6. Berkeley: USENIX Association, 2006: 3.
[10] Wang Haining, Zhang Danlu, Shin K G. Detecting SYN Flooding Attacks [C]//Proceedings of IEEE 21st Annual Joint Conference on Computer and Communications Societies: 3. Piscataway: IEEE, 2002: 1530-1539.
[11] Manikopoulos C, Papavassiliou S. Network Intrusion and Fault Detection: a Statistical Anomaly Approach [J]. IEEE Communications Magazine , 2002, 40(10): 76-82.
[12] Mirkovic J, Reiher P. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms [J]. Computer Communication Review, 2004, 34(2): 39-53. |