共 98 条
[1]
Nikolai J, Wang Y., A system for detecting malicious insider data theft in IaaS cloud environments, Proceedings of the 59th IEEE Global Communications Conference, pp. 1-6, (2016)
[2]
Feng Deng-Guo, Zhang Min, Zhang Yan, Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
[3]
Chen Xing-Shu, Ge Long, Cloud Security Principle and Practice, (2017)
[4]
Somani G, Gaur M S, Sanghi D, Et al., Combating DDoS attacks in the cloud: Requirements, trends, and future directions, IEEE Cloud Computing, 4, 1, pp. 22-32, (2017)
[5]
Hoque N, Bhattacharyya D K, Kalita J K., Botnet in DDoS attacks: Trends and challenges, IEEE Communications Surveys & Tutorials, 17, 4, pp. 2242-2270, (2015)
[6]
Zhang Yu-Qing, Wang Xiao-Fei, Liu Xue-Feng, Et al., Survey on cloud computing security, Journal of Software, 27, 6, pp. 1328-1348, (2016)
[7]
Li Ke, Fang Bin-Xing, Cui Xiang, Et al., Study of botnets trends, Journal of Computer Research and Development, 53, 10, pp. 2189-2206, (2016)
[8]
Zand A, Modelo-Howard G, Tongaonkar A, Et al., Demystifying DDoS as a service, IEEE Communications Magazine, 55, 7, pp. 14-21, (2017)
[9]
DDoS and application attacks, 5, 1, (2019)
[10]
AWS Best Practices for DDoS Resiliency, (2016)