2016
DOI: 10.1007/978-3-319-29006-5_10
|View full text |Cite
|
Sign up to set email alerts
|

A Plugin-Based Approach to Exploit RDMA Benefits for Apache and Enterprise HDFS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…In addition, if the attacker's VM (or virtualized server) is connected to a storage server with RDMA using protocols such as SMBDirect [32] or NFS [33], then NetCAT enables an attacker to spy on other clients that connect to the storage server. Similarly, cloud key-value service [34] and applications that integrate RDMA to improve their performance, including big data [35,36], machine learning [37], and database [38] could be abused by NetCAT-like attacks.…”
Section: Threat Modelmentioning
confidence: 99%
“…In addition, if the attacker's VM (or virtualized server) is connected to a storage server with RDMA using protocols such as SMBDirect [32] or NFS [33], then NetCAT enables an attacker to spy on other clients that connect to the storage server. Similarly, cloud key-value service [34] and applications that integrate RDMA to improve their performance, including big data [35,36], machine learning [37], and database [38] could be abused by NetCAT-like attacks.…”
Section: Threat Modelmentioning
confidence: 99%