Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks"
written by Shweta Tripathi, Brij Gupta, Ammar Almomani, Anupama Mishra, Suresh Veluru,
published by Journal of Information Security, Vol.4 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments
2021
[2] A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
2020
[3] Uma Metodologia para análise de incidentes de segurança da informação
2020
[4] Denial of Service Attacks: Difference in Rates, Duration, and Financial Damages and the Relationship Between Company Assets and Revenues
2020
[5] Cross-site Scripting Attacks: Classification, Attack, and Countermeasures
2020
[6] An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
2020
[7] The detection method of low-rate DoS attack based on multi-feature fusion
2020
[8] A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
2020
[9] Ways to eliminate DDos attacks
2020
[10] Методы обнаружения и предотвращения DDOS-атак
2019
[11] Applying Multi-Level Theory to an Information Security Incident Domain Ontology.
2019
[12] Systematic review of aspects of DDoS attacks detection
2019
[13] Applying Multi-Level Theory to an Information Security Incident Domain Ontology
2019
[14] A Review on Detection of DDOS Attack Using Machine Learning and Deep Learning Techniques
2019
[15] Développement d'un protocole SCADA temps réel sécurisé à base de l'IEC 60870-5-101
2019
[16] DDoS Attacks—Analysis and Prevention
Innovations in Computer Science and Engineering, 2019
[17] The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy
2018
[18] An efficient index structure for distributed k-nearest neighbours query processing
Soft Computing, 2018
[19] Fixing the Cloud Forensic Problem with Blockchain
2018
[20] Multi-agent-based DDoS detection on big data systems
2018
[21] Security Analytics Tools and Implementation Success Factors: Instrument Development Using Delphi Approach and Exploratory Factor Analysis
2018
[22] Could Block Chain Technology Help Resolve the Cloud Forensic Problem?
2018
[23] Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
2018
[24] Researching Cyber Weapons: An Enumerative Bibliography
Cyber Weaponry, 2018
[25] Network Anomaly Detection and Prevention using Statistical and Machine Learning Approaches
2018
[26] Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
2018
[27] A Game Theory Model for Detection and Mitigation of Ddos Attacks on Web Servers
2018
[28] Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy.
2017
[29] Collaborative detection and filtering techniques against denial of service attacks in cloud computing
2017
[30] DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
Security and Communication Networks, 2017
[31] COLLABORATIVE DETECTION AND FILTERING TECHNIQUES AGAINST DENIAL OF SERVICE ATTACKS IN CLOUD COMPUTING.
Journal of Theoretical and Applied Information Technology, 2017
[32] Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Security and Communication Networks, 2017
[33] Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks
2017
[34] Foreword
2017
[35] Data-Driven Anomaly Detection in Industrial Networks
2017
[36] An Empirical Study of The Impact of DoS, DDoS Attacks on Various Web Servers and Application Servers
Journal of Science and Technology on Information Security, 2017
[37] Denial of service attacks detection using synchronization packets analysis
2017
[38] Designing a Robust Closed-Loop Intrusion Detection Predictive Model Using Signal Processing Techniques in Cloud Computing Environment
2017
[39] Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy
Wireless Personal Communications, 2017
[40] HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
Security and Communication Networks, 2016
[41] Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce
International Journal of Data Warehousing and Mining (IJDWM), 2016
[42] Graphics processing unit based next generation DDoS prevention system
2016
[43] Comparative analysis of features based machine learning approaches for phishing detection
2016
[44] A survey of cloud-based network intrusion detection analysis
2016
[45] BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
2016
[46] Recent survey of various defense mechanisms against phishing attacks
Journal of Information Privacy and Security, 2016
[47] Bigdata platform based approach for defending against DDoS
Int'l Conf. on Advances in Big Data Analytics, 2016
[48] Securing cloud computing.
2016
[49] Distributed Denial of Service Prevention Techniques
2015
[50] A Novel approach for Detection of Distributed Denial of Service attack in VANET
International Journal of Computer Applications, 2015
[51] Intrusion Detection and Countermeasure of Virtual Cloud Systems-State of the Art and Current Challenges
International Journal of Advanced Computer Science and Applications, 2015
[52] Safety of data warehouse for remote laboratories in Laboratory Management System and network of road junctions
2015
[53] Distributed Denial of Service (DDOS) Attack, Networks, Tools and DEFENSE.
International Journal of Applied Engineering Research, 2015
[54] Defending Against DDOS Flooding Attacks-A Data Streaming Approach
2015
[55] Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
International Journal of Engineering Research and Technology, 2015
[56] Similarity Detection via Random Subsets for Cyber War Protection in Big Data using Hadoop Framework
2015
[57] Defence for Distributed Denial of Service Attacks in Cloud Computing
Procedia Computer Science, 2015
[58] DDoS detection and filtering technique in cloud environment using GARCH model
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), 2015
[59] A Proactive Approach to Intrusion Detection in Cloud Software as a Service
Achieving Enterprise Agility through Innovative Software Development, 2015
[60] Botnet-originated DDoS attacks: Overview and Mitigation
2015
[61] Detection of DDoS attack in VANET using LPN (Local Protection Node)
2015
[62] THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
2014
[63] Defense against DoS attack: PSO approach in virtualization
2014
[64] Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach
2014
[65] An Efficient Attack Resistance Model Using Application Based Polynomial Distribution
2014
[66] Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed
International Journal of Fuzzy Systems, 2014
[67] Cyber Conflict Bibliography
GWU Legal Studies Research Paper, 2013
[68] Digital compensation for timing mismatches in interleaved ADCs
2013
[69] IJERT-Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
Free SCIRP Newsletters
Copyright © 2006-2022 Scientific Research Publishing Inc. All Rights Reserved.
Top