|
[1] Arnfield, R. (2013). Mobile malware to have doubled in 2013, says McAfee. Retrieved January, 29, 2014. [2] Arbor, N. (2014). Worldwide infrastructure security report, volume ix. URLpages. arbornetworks. com/rs/arbor/images/WISR2014. pdf. [3] Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422-426. [4] Bellovin, S. M. (1989). Security problems in the TCP/IP protocol suite. ACM SIGCOMM Computer Communication Review, 19(2), 32-48. [5] Batbilig, B., & Ionut, T. (2015). PhoneGap: Potentials of a Mobile Cross-Platform Application. [6] Broder, A., & Mitzenmacher, M. (2004). Network applications of bloom filters: A survey. Internet mathematics, 1(4), 485-509. [7] Claise, B. (2004). Cisco systems netflow services export version 9 (No. RFC 3954). [8] Center, C. C. (1996). CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack. [9] Center, C. C. (1998). CERT advisory CA-1998-01 smurf IP denial-of-service attacks. [10] Carl, G., Brooks, R. R., & Rai, S. (2006). Wavelet based denial-of-service detection. Computers & Security, 25(8), 600-615. [11] Conta, A., Deering, S., & Gupta, M. (2006). Internet control message protocol (icmpv6) for the internet protocol version 6 (ipv6) specification (No. RFC 4443). [12] Carl, G., Kesidis, G., Brooks, R. R., & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet computing, 10(1), 82-89. [13] Dalmasso, I., Datta, S. K., Bonnet, C., & Nikaein, N. (2013, July). Survey, comparison and evaluation of cross platform mobile application development tools. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 323-328). IEEE. [14] Dokas, P., Ertoz, L., Kumar, V., Lazarevic, A., Srivastava, J., & Tan, P. N. (2002, November). Data mining for network intrusion detection. In Proc. NSF Workshop on Next Generation Data Mining (pp. 21-30). [15] Dillinger, P. C., & Manolios, P. (2004, November). Bloom filters in probabilistic verification. In International Conference on Formal Methods in Computer-Aided Design (pp. 367-381). Springer, Berlin, Heidelberg. [16] Eddy, W. (2007). TCP SYN flooding attacks and common mitigations (No. RFC 4987). [17] Estan, C., & Varghese, G. (2002). New directions in traffic measurement and accounting (Vol. 32, No. 4, pp. 323-336). ACM. [18] Estan, C., Varghese, G., & Fisk, M. (2003, October). Bitmap algorithms for counting active flows on high speed links. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement (pp. 153-166). ACM. [19] Fosnock, C. (2005). Computer worms: past, present, and future. East Carolina University, 8. [20] Fan, L., Cao, P., Almeida, J., & Broder, A. Z. (2000). Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking (TON), 8(3), 281-293. [21] Foroushani, V. A., & Zincir-Heywood, A. N. (2014, May). TDFA: traceback-based defense against DDoS flooding attacks. In Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on (pp. 597-604). IEEE. [22] Gartner, G. (2013). Gartner says mobile app stores will see annual downloads reach 102 billion in 2013. Press Release. [23] Glaser, J. D. (2014). Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript. Auerbach Publications. [24] Ganguly, S., Garofalakis, M., Rastogi, R., & Sabnani, K. (2007, June). Streaming algorithms for robust, real-time detection of ddos attacks. In Distributed Computing Systems, 2007. ICDCS'07. 27th International Conference on (pp. 4-4). IEEE. [25] Gresty, D. W., Shi, Q., & Merabti, M. (2001, December). Requirements for a general framework for response to distributed denial-of-service. In Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual (pp. 422-429). IEEE. [26] Hughes, L. J. (1995). Actually useful Internet security techniques. Larry J Hughes Jr. [27] Internet outage in China on Jan 21. (2014). https://en.greatfire.org/blog/2014/jan/internet-outage-china-jan-21 [28] Joshua Epstein. (2014). http://blog.gizmox.com/Why-HTML5-Apps-are-more-secure-than-native-mobile-Apps. [29] Joukov, N. (Ed.). (2017). Information Science and Applications (icisa) 2016. Springer Verlag, Singapore. [30] Joorabchi, M. E., Mesbah, A., & Kruchten, P. (2013, October). Real challenges in mobile app development. In Empirical Software Engineering and Measurement, 2013 ACM/IEEE International Symposium on (pp. 15-24). IEEE. [31] Jaiganesh, V., Mangayarkarasi, S., & Sumathi, P. (2013). Intrusion detection systems: A survey and analysis of classification techniques. International Journal of Advanced Research in Computer and Communication Engineering, 2(4), 1629-1635. [32] Korf, M., & Oksman, E. (2012). Native, HTML5, or Hybrid: Understanding your mobile application development options. Online post available online from: http://wiki. developerforce. com/[Accessed Sept. 2015] Seilhamer, R., Baiyun C. & Sugar, A.(2013). A framework for Implementing Mobile Technology. In Z. Berge & L. Muilenburg (Eds.). Handbook of Mobile Learning, 382-394. [33] Khattab, S. M., Sangpachatanaruk, C., Mosse, D., Melhem, R., & Znati, T. (2004). Roaming honeypots for mitigating service-level denial-of-service attacks. In Distributed Computing Systems, 2004. Proceedings. 24th International Conference on (pp. 328-337). IEEE. [34] Li, M. (2004). An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. Computers & Security, 23(7), 549-558. [35] Li, M. (2006). Change trend of averaged Hurst parameter of traffic under DDOS flood attacks. Computers & security, 25(3), 213-220. [36] Lim, S. H. (2015). Experimental comparison of hybrid and native applications for mobile systems. International Journal of Multimedia and Ubiquitous Engineering, 10(3), 1-12. [37] Ling, Y., Gu, Y., & Wei, G. (2009). Detect SYN flooding attack in edge routers. International Journal of Security and its Applications, 3(1), 31-45. [38] Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24. [39] Lu, Y., Montanari, A., Prabhakar, B., Dharmapurikar, S., & Kabbani, A. (2008). Counter braids: a novel counter architecture for per-flow measurement. ACM SIGMETRICS Performance Evaluation Review, 36(1), 121-132. [40] Meghanathan, N. (2014). A Tutorial on Network Security: Attacks and Controls. arXiv preprint arXiv:1412.6017. [41] Manna, M. E., & Amphawan, A. (2012). Review of syn-flooding attack detection mechanism. arXiv preprint arXiv:1202.1761. [42] Miao, L., Ding, W., & Gong, J. (2015, April). A real-time method for detecting internet-wide SYN flooding attacks. In Local and Metropolitan Area Networks (LANMAN), 2015 IEEE International Workshop on (pp. 1-6). IEEE. [43] Mittal, M., Khan, A., & Agrawal, C. (2013). A Study of Different Intrusion Detection and Prevension System. International Journal of Scientific & Engineering Research, 4(8), 1526-1531. [44] Min, B., & Varadharajan, V. (2015, December). Design and evaluation of feature distributed malware attacks against the Internet of Things (IoT). In Engineering of Complex Computer Systems (ICECCS), 2015 20th International Conference on (pp. 80-89). IEEE. [45] Mao, X., & Xin, J. (2014). Developing Cross-platform Mobile and Web Apps. CIGR Proceedings, 1(1). [46] Nicole, R. (2014, December). Worldwide Smartphone Growth Forecast to Slow from a Boil to a Simmer as Prices Drop and Markets Mature, According to IDC. Abbrev, in press. http://www.idc.com/getdoc.jsp?containerId=prUS25282214. [47] Ng, J., Joshi, D., & Banik, S. M. (2015, April). Applying data mining techniques to intrusion detection. In 2015 12th International Conference on Information Technology-New Generations (ITNG) (pp. 800-801). IEEE. [48] Open Web Application Security Project (2013). OWASP Top Ten Project. Retrieved January 29,2014. https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project [49] Ponemon Institue, L. L. C. (2013). Cost of Cyber Crime Study: United States. Traverse City, http://media.scmagazine.com/documents/54/2013_us_ccc_report_final_6-1_13455.pdf, 2013. Last Accessed November 10, 2014. [50] Postel, J. (1983). Character generator protocol. [51] Paxson, V. (1999). Bro: a system for detecting network intruders in real-time. Computer networks, 31(23-24), 2435-2463. [52] Phaal, P., Panchen, S., & McKee, N. (2001). InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks (No. RFC 3176). [53] Ramabhadran, S., & Varghese, G. (2003, June). Efficient implementation of a statistics counter architecture. In ACM SIGMETRICS Performance Evaluation Review (Vol. 31, No. 1, pp. 261-271). ACM. [54] Shotts, K. (2014). PhoneGap for enterprise. Packt Publishing Ltd. [55] Sun, C., Hu, C., Tang, Y., & Liu, B. (2009, August). More Accurate and Fast SYN Flood Detection. In ICCCN (pp. 1-6). [56] Serrano, N., Hernantes, J., & Gallardo, G. (2013). Mobile web apps. IEEE software, 30(5), 22-27. [57] Shah, D., Iyer, S., Prabhakar, B., & McKeown, N. (2001, August). Analysis of a statistics counter architecture. In Hot Interconnects (Vol. 9, pp. 107-111). [58] Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems (idps). NIST special publication, 800(2007), 94. [59] Weaver, N., Staniford, S., & Paxson, V. (2004, August). Very Fast Containment of Scanning Worms. In USENIX Security Symposium (Vol. 2, pp. 16-85). [60] Wang, H., Zhang, D., & Shin, K. G. (2002, June). Detecting SYN flooding attacks. In INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE (Vol. 3, pp. 1530-1539). IEEE. [61] Yang, X., Ma, T., & Shi, Y. (2007, March). Typical dos/ddos threats under ipv6. In Computing in the Global Information Technology, 2007. ICCGI 2007. International Multi-Conference on (pp. 55-55). IEEE. [62] Yang, J., Ma, H., Zhang, B., & Chen, P. (2008, October). An Efficient Approach for Analyzing Multidimensional Network Traffic. In Asia-Pacific Network Operations and Management Symposium (pp. 227-235). Springer, Berlin, Heidelberg. [63] Yi, F., Yu, S., Zhou, W., Hai, J., & Bonti, A. (2008). Source-based filtering scheme against DDOS attacks. International Journal of Database Theory and Application, 1(1), 9-20. [64] Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials, 15(4), 2046-2069. [65] Zhao, Q., Xu, J., & Liu, Z. (2006). Design of a novel statistics counter architecture with optimal space and time efficiency. ACM SIGMETRICS Performance Evaluation Review, 34(1), 323-334.
|