- "https://www.akamai.com/us/en/resources/ddos.jsp” 2015.
- "http://www8.hp.com/emea_middle_east/ar/home.html” "https://www.symantec.com/solutions/financial-services”
- Hp-ponemon, “Hewlett-Packard,” 2014.
- J. Mirkovic, “D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks,” Ph.D Thesis,
- “http://www.prolexic.com/resources/ddos.jsp,” 2013.
- T. Ross and j. Wiley, “Fuzzy Logic with Engineering Application,” The Atrium, Southern Gate, Chichester, West Sussex, vol. United Kingdom, 2005.
- C. Hsue, “Evaluating the Best Main Battle Tank Using Fuzzy Decision Theory with Linguistic Criteria Evaluation,” European Journal Of Operational Research, vol. 142, 2002.
- X. Peng Su and H. Tang, “DoS Attack Impact Assessment based on 3GPP QoS Indexes,” Institute of Electronic Technology, The PLA Information Engineering University, P. R. China, 2008.
- P. Mirkovic, S. Fahmy, R. Thomas, A. Hussain, and S. Schwab, “Measuring Impact of denial Of service,” 2nd ACM workshop on Quality of protection QoP, pp. 53 - 58, 2006.
- S. Kumar, M. Sachdeva, and K. Kumar, “Flooding based DDoS attacks and their influence on web services,” International Journal of Computer Science and InformationTechnology, vol. 2, no. 3, pp. 1131-1136, 2011.
- K. Kumar, “Protection from Distributed Denial of Service (DDoS) Attacks in ISP Domain,” Indian Institute of Technology, Roorkee, 2007.
- J. Mirkovic, B. Wilson, S. Fahmy, P. Reiher, R Thomas, W. Yao, and S. Schwab, “Towards user-centric metrics for denial-of-service measurement,” In proceedings of the workshop on Experimental computer science, San Diego, California, 2007.
- S. Schwab, R. Thomas, and B. Wilson, “Towards systematic IDS evaluation,” In Proceedings of DETER Community Workshop, pp. 20-23, June 2006.
- C. Joshi, “An Integrated Honeypot Framework for Proactive Detection, Characterization and Redirection of DDoS Attacks at ISP level,” International Journal of Information Assurance and Security (JIAS), vol. 3, no. 1,
- pp. 1-15, March 2008.
- B. Gupta and M. Misra, “An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach,” Journal of Information Assurance and Security, vol. 3, no. 2, pp. 102-110, June 2008.
- W. T. Dubendorfer and B. Plattner, “An economic damage model for large-scale Internet attacks,” In 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, vol. IEEE Comput. Soc., pp. 223-228, 2004.
- D. Merwe, “MIDAS: An Impact Scale for DDoS attacks,” 15th IEEE Workshop on Local & Metropolitan Area Networks, pp. 200–205, 2007.
- V. Raja, S. Reddy Gade, and S. Kumar, “Performance of Win-dows XP, Windows Vista and Apple’s Leopard Computers under a Denial of Service Attack,” In Fourth International Conference on Digital Society, pp. 188-191, IEEE, February 2010, 2010.
- F. Roman Chertov and B. Shroff, “Emulation versus Simula-tion: A Case Study TCP-Targeted Denial of Service Attacks,” 2nd International Conference on Testbeds and Research Infrastructures for the Development of Net-works and Communities, pp. 316–325, 2006.
- I. Traore, “Queue-based analysis of DoS attacks,” In Information Assurance Workshop, IAW’05, pp. 266-273 2005.
- S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoid-ance,” IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397-413, 1993.
- H. Alefiya Hussain and C. Papadopoulos, “A framework for classi-fying denial of service attacks,” In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications-SIGCOMM New York, USA ACM Press, p. 99, 2003.
- H. Jelena Mirkovic, S. Fahmy, P. Reiher, and R. Thomas,
- “Accurately Measuring Denial of Service in Simulation and Testbed Experiments,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 2, pp. 81-95, April 2009.
- G. Monika Sachdeva and K. Kumar, “An emulation based impact analysis of DDoS attacks on web services during flash events,” 2nd International Conference on Computer and Communication Technology (ICCCT-2011), pp. 479-484, 2011.
- K. Monika Sachdeva, G. Singh, and K. Singh, “Performance Analysis of Web Service under DDoS Attacks,” IEEE International Advance Computing Conference, number March, pp. 1002-1007, 2009.
- "https://www.neustar.biz/security/ddos-protection", 2012.
- H. Builder and C. Nordin, “Alternative Models of Command and Control,” In: Command Concepts: A Theory Derived from the Practice of Command and Control, Rand Corp., 1999.
- K. Monika Sachdeva, G. Singh, and K. Singh, “Performance Analysis of Web Service under DDoS Attacks,” IEEE International Advance Computing Conference (IACC 2009), March 2009.
- C. Rither, “Predicting the Impact of Denial of Service Attacks,” Department of Electrical and Computer Engineering, THESIS: Degree of Master of Science, Air University, Ohio, 2012.
- G. Monika Sachdeva, K. Kumar1, and K. Singh, “Measuring Impact of DDOS Attacks on Web Services,” Information Assurance and Security, 2010.
- H. Teodor Sommestad and M. Ekstedt, “Estimates of success rates of Denial-of-Service attacks,” Royal Institute of Technology (KTH), 2011.
|