4Jansen W, Timothy G. Security Guidance for Critical Areas of Focus in Cloud Computing v3.0 [M]. Phoenix: Cloud Security Alliance, 2011.
5Modi C, Patel D, Borisanyia B, et al. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing [J]. Journal of Supercomputing, 2013, 63(2): 561-592.
6Choi H, Lee H. Identifying Botnets by Capturing Group Activities in DNS Traffic [J]. Computer Networks, 2012, 56 (1) : 20-33.
7Hunt N, Bergan T, Ceze L, et al. DDOS: Taming Nondeterminism in Distributed Systems [C] //Proceedings of the 18th International Conference on Architectural Support for Programming Languages and operating Systems. New York: ACM, 2013: 499-508.
8Botezatu B. Anatomy of a Botnet [R]. Burlington: Arbor Networks, 2010.