參考文獻 |
[1] “Elastic cloud storage”, Accessed on: Jun 7, 2021. [Online] Available: https://en.wikipedia.org/wiki/Elastic_cloud_storage
[2] “State-of-the-cloud-2021”, Accessed on: Jul 3, 2021. [Online]. Available: https://resources.flexera.com/web/pdf/report-cm-state-of-the-cloud-2021.pdf
[3] “Global Cloud Index Projects Cloud Traffic to Represent 95 Percent of Total Data Center Traffic by 2021”, Accessed on: Jun 19, 2021. [Online]. Available: https://newsroom.cisco.com/press-release-content?articleId=1908858
[4] Chowdhury, Fahad Zaman, et al. "Economic denial of sustainability (EDoS) mitigation approaches in cloud: Analysis and open challenges." 2017 International Conference on Electrical Engineering and Computer Science (ICECOS). IEEE, 2017.
[5] “k-means clustering”, Access on: May 17, 2021. [Online]. Available: https://en.wikipedia.org/wiki/K-means_clustering
[6] “Cloud Computing” Accessed on: May 8, 2021 [Online] Available: https://en.wikipedia.org/wiki/Cloud_computing
[7] Jothy Rosenberg and Arthur Mateos, “The Cloud at Your Service”, Accessed on: Jun 28, 2021. [Online]. Available: https://livebook.manning.com/book/the-cloud-at-your-service/chapter-1/11
[8] “Introduction to the world of cloud computing”, 2020. Accessed on: May 10, 2021. [Online]. Available: https://wakeupcoders.medium.com/introduction-to-the-world-of-cloud-computing-61ebcef86318
[9] “Autoscaling” , Accessed on: May 12, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Autoscaling
[10] “Scaling Horizontally vs. Scaling Vertically” , Accessed on: May 12, 2021. [Online]. Available: https://www.section.io/blog/scaling-horizontally-vs-vertically/
[11] “Denial-of-service attack”, Accessed on: May 2, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Denial-of-service_attack
[12] David Warburton, “DDoS Attack Trends for 2020”, 2021. Accessed on: Jun 3, 2021. [Online]. Available: https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020
[13] “Impact of DDoS on Enterprise Organizations” Accessed on: Jul 3, 2021. [Online] https://go.corero.com/hubfs/3.%20Website%20Content/1.%20Asset%20Downloads/5.%20Infographics/Impact-DDoS-On-Enterprise-Infographic.pdf
[14] Chowdhury, Fahad Zaman, et al. "Economic denial of sustainability (EDoS) mitigation approaches in cloud: Analysis and open challenges." 2017 International Conference on Electrical Engineering and Computer Science (ICECOS). IEEE, 2017.
[15] Yaniv Yagolnitzer, “"Yo-Yo" DDoS Attacks: How to Defeat Them”, 2020. Accessed on: May 10, 2021. [Online]. Available: https://www.reblaze.com/blog/yo-yo-ddos-attacks-how-to-defeat-them/
[16] “intrusion detection system (IDS)”, Accessed on: May 10, 2021. [Online]. Available: https://searchsecurity.techtarget.com/definition/intrusion-detection-system
[17] “intrusion detection system”, Accessed on: May 10, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Intrusion_detection_system
[18] Bhingarkar, A. Sukhada, and B. Deven Shah. "A survey: Securing cloud infrastructure against edos attack." Proceedings of the International Conference on Grid, Cloud, and Cluster Computing (GCC). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2015.
[19] Sqalli, Mohammed H., Fahd Al-Haidari, and Khaled Salah. "Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing." 2011 Fourth IEEE international conference on utility and cloud computing. IEEE, 2011.
[20] Morein, William G., et al. "Using graphic turing tests to counter automated ddos attacks against web servers." Proceedings of the 10th ACM conference on Computer and communications security. 2003.
[21] Guide, Developer. "Amazon CloudWatch." (2009).
[22] Kumar, Madarapu Naresh, et al. "Mitigating economic denial of sustainability (edos) in cloud computing using in-cloud scrubber service." 2012 Fourth international conference on computational intelligence and communication networks. IEEE, 2012.
[23] Cho, Hark Su, and Young Kook Noh. "System for preventing normal user being blocked in network address translation (NAT) based web service and method for controlling the same." U.S. Patent No. 8,434,141. 30 Apr. 2013.
[24] Bhargrava, Krishna, Douglas Brewer, and Kang Li. "A study of URL redirection indicating spam." CEAS (July 2009) (2009).
[25] Shawahna, Ahmad, et al. "EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks." IEEE Transactions on Cloud Computing 8.3 (2018): 790-804.
[26] Xu, Xiaoqiong, et al. "Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism." Digital Communications and Networks 6.3 (2020): 369-376.
[27] Somani, Gaurav, et al. "DARAC: DDoS mitigation using DDoS aware resource allocation in cloud." International conference on information systems security. Springer, Cham, 2015.
[28] Masood, Muddassar, et al. "Edos armor: a cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments." INMIC. IEEE, 2013.
[29] Thapngam, Theerasak, et al. "Discriminating DDoS attack traffic from flash crowd through packet arrival patterns." 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, 2011.
[30] Berndt, Donald J., and James Clifford. "Using dynamic time warping to find patterns in time series." KDD workshop. Vol. 10. No. 16. 1994.
[31] “Comparison-of-Euclidean-Distance-Measurements-and-DTW” , Access on: Jun 15, 2021. [Online]. Available: https://www.researchgate.net/figure/Comparison-of-Euclidean-Distance-Measurements-and-DTW_fig4_318229494
[32] Van Der Vlist, Rik, Cees Taal, and Richard Heusdens. "Tracking recurring patterns in time series using dynamic time warping." 2019 27th European Signal Processing Conference (EUSIPCO). IEEE, 2019.
[33] Wang, Weizeng, et al. "Time series clustering based on dynamic time warping." 2018 IEEE 9th international conference on software engineering and service science (ICSESS). IEEE, 2018.
[34] Hong, Jae Yeol, Seung Hwan Park, and Jun-Geol Baek. "Segmented dynamic time warping based signal pattern classification." 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2019.
[35] “Docker”, Access on: May 1, 2021. [Online]. Available: https://www.docker.com/
[36] “What is a Container? | App Containerization | Docker”, Access on: May 1, 2021. [Online]. Available: https://www.docker.com/resources/what-container
[37] “Requests: HTTP for Humans” , Access on: May 8, 2021. [Online]. Available: https://docs.python-requests.org/en/master/
[38] “Python Scapy” , Access on: May 1, 2021. [Online]. Available: https://scapy.readthedocs.io/en/latest/introduction.html
[39] “Rand Index” , Access on: Aug 20, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Rand_index
[40] “Mutual Information” , Access on: Aug. 20, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Mutual_information
[41] “Silhouette (clustering)” , Access on: Aug. 20, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Silhouette_(clustering)
[42] “Amazon EC2 On-Demand Pricing”, Access on: Aug. 20, 2021. [Online]. Available: https://aws.amazon.com/ec2/pricing/on-demand
[43] “Geekbench 5”, Access on: Aug. 29, 2021. [Online]. Available: https://www.geekbench.com/
[44] “innotek GmbH VirtualBox”, Access on: Aug. 29, 2021. [Online]. Available: https://browser.geekbench.com/v5/cpu/9587105?fbclid=IwAR1ss5LuwLXVjCPLzujiKlv9nFB4-md8ftW-YFXzEkEcLZgZ9H_w-pZD9W8
[45] “AWS Lightsail - General Xen HVM domU”, Access on: Aug. 29, 2021. [Online]. Available:https://browser.geekbench.com/v5/cpu/8861505?fbclid=IwAR2dt7ihW3ewqTwBRHB1GCfQ89xbQ0zdgoCkHFLqwdxIXpg_KND6t4tDTe4
[46] “Pearson correlation coefficient”, Access on: May 17, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Pearson_correlation_coefficient
[47] Santhosh, K. R., and C. Fancy. "A dedicated setup to identify spoofing via IP-traceback." 2017 International Conference on Intelligent Sustainable Systems (ICISS). IEEE, 2017.
[48] Lema, Hussein, Fatuma Simba, and Abdulla Ally. "Preventing utilization of shared network resources by detecting IP spoofing attacks through validation of source IP address." 2018 IST-Africa Week Conference (IST-Africa). IEEE, 2018.
[49] Kavisankar, L., and C. Chellappan. "A Mitigation model for TCP SYN flooding with IP Spoofing." 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2011.
[50] “What is reinforcement learning? The complete guide” , Access on: May 1, 2021. [Online]. Available: https://deepsense.ai/what-is-reinforcement-learning-the-complete-guide/ |