{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T13:56:59Z","timestamp":1764079019053,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_34","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"382-395","source":"Crossref","is-referenced-by-count":11,"title":["Index Page Based EDoS Attacks in Infrastructure Cloud"],"prefix":"10.1007","author":[{"given":"Bhavna","family":"Saini","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Somani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Fu, Z., Papatriantafilou, M.: Off the wall: Lightweight distributed filtering to mitigate distributed denial of service attacks. In: 2012 IEEE 31st Symposium on Reliable Distributed Systems (SRDS), pp. 207\u2013212 (2012)","DOI":"10.1109\/SRDS.2012.45"},{"issue":"11","key":"34_CR2","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1016\/j.comcom.2012.04.008","volume":"35","author":"H. Beitollahi","year":"2012","unstructured":"Beitollahi, H., Deconinck, G.: Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communications\u00a035(11), 1312\u20131332 (2012), http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366412001211","journal-title":"Computer Communications"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Sqalli, M., Al-Haidari, F., Salah, K.: Edos-shield - a two-steps mitigation technique against edos attacks in cloud computing. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 49\u201356 (2011)","DOI":"10.1109\/UCC.2011.17"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Al-Haidari, F., Sqalli, M., Salah, K.: Enhanced edos-shield for mitigating edos attacks originating from spoofed ip addresses. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1167\u20131174 (2012)","DOI":"10.1109\/TrustCom.2012.146"},{"issue":"4","key":"34_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M. Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM\u00a053(4), 50\u201358 (2010), http:\/\/doi.acm.org\/10.1145\/1721654.1721672","journal-title":"Commun. ACM"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Idziorek, J., Tannian, M.: Exploiting cloud utility models for profit and ruin. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 33\u201340 (2011)","DOI":"10.1109\/CLOUD.2011.45"},{"issue":"4","key":"34_CR7","first-page":"397","volume":"46","author":"M. Okuhara","year":"2010","unstructured":"Okuhara, M., Shiozaki, T., Suzuki, T.: Security architecture for cloud computing. Fujitsu Sci. Tech. J.\u00a046(4), 397\u2013402 (2010)","journal-title":"Fujitsu Sci. Tech. J."},{"key":"34_CR8","unstructured":"Amazon-EC2, http:\/\/aws.amazon.com\/ec2\/"},{"key":"34_CR9","unstructured":"Ye, C., Zheng, K.: Detection of application layer distributed denial of service. In: 2011 International Conference on Computer Science and Network Technology (ICCSNT), vol.\u00a0 1, pp. 310\u2013314 (2011)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Kashyap, B., Jena, S.: Ddos attack detection and attacker identification. International Journal of Computer Applications\u00a042(1) (2012)","DOI":"10.5120\/5657-7549"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, J., Qin, Z., Ou, L., Jiang, P., Liu, J., Liu, A.: An advanced entropy-based ddos detection scheme. In: International Conference on Information Networking and Automation (ICINA), vol.\u00a02, pp. V2-67\u2013V2-71 (2010)","DOI":"10.1109\/ICINA.2010.5636786"},{"key":"34_CR12","unstructured":"Devi, S.R., Yogesh, P.: Detection of application layer ddos attacks using information theory based metrics (2012)"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Fu, Z., Papatriantafilou, M., Tsigas, P.: Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts. In: IEEE Symposium on Reliable Distributed Systems, SRDS 2008, pp. 63\u201372 (2008)","DOI":"10.1109\/SRDS.2008.30"},{"key":"34_CR14","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1145\/1947940.1948047","volume-title":"Proceedings of the 2011 International Conference on Communication, Computing &#38; Security, ICCCS 2011","author":"D. Das","year":"2011","unstructured":"Das, D., Sharma, U., Bhattacharyya, D.K.: Detection of http flooding attacks in multiple scenarios. In: Proceedings of the 2011 International Conference on Communication, Computing &#38; Security, ICCCS 2011, pp. 517\u2013522. ACM, New York (2011), http:\/\/doi.acm.org\/10.1145\/1947940.1948047"},{"issue":"1","key":"34_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TNET.2008.925628","volume":"17","author":"Y. Xie","year":"2009","unstructured":"Xie, Y., Zheng Yu, S.: Monitoring the application-layer ddos attacks for popular websites. IEEE\/ACM Transactions on Networking\u00a017(1), 15\u201325 (2009)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Lu, W.-Z., Zheng Yu, S.: An http flooding detection method based on browser behavior. In: 2006 International Conference on Computational Intelligence and Security, vol.\u00a02, pp. 1151\u20131154 (2006)","DOI":"10.1109\/ICCIAS.2006.295444"},{"key":"34_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-35416-8_20","volume-title":"Information Security Applications","author":"H. Kim","year":"2012","unstructured":"Kim, H., Kim, B., Kim, D., Kim, I.-K., Chung, T.-M.: Implementation of GESNIC for web server protection against HTTP GET flooding attacks. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol.\u00a07690, pp. 285\u2013295. Springer, Heidelberg (2012)"},{"issue":"2","key":"34_CR18","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM\u00a047(2), 56\u201360 (2004), http:\/\/doi.acm.org\/10.1145\/966389.966390","journal-title":"Commun. ACM"},{"key":"34_CR19","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1145\/1772690.1772748","volume-title":"Proceedings of the 19th International Conference on World Wide Web, WWW 2010","author":"R. Kumar","year":"2010","unstructured":"Kumar, R., Tomkins, A.: A characterization of online browsing behavior. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 561\u2013570. ACM, New York (2010), http:\/\/doi.acm.org\/10.1145\/1772690.1772748"},{"key":"34_CR20","unstructured":"NASA-Server-Traces, http:\/\/ita.ee.lbl.gov\/html\/contrib\/NASA-HTTP.html"},{"key":"34_CR21","unstructured":"DARPA-Dataset, http:\/\/www.ll.mit.edu\/mission\/communications\/cyber\/CSTcorpora\/ideval\/data\/1999\/training\/week1\/index.html"},{"key":"34_CR22","unstructured":"Iptable, http:\/\/linux.die.net\/man\/8\/iptables"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:51Z","timestamp":1746130671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}