2020
DOI: 10.1007/s12652-020-02556-0
|View full text |Cite
|
Sign up to set email alerts
|

CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…All the other previous works tackle simpler search problems by only focusing on a single mitigation class (Marsa-Maestre et al [21]), a one-to-one mapping from attack action classes to mitigation action classes (Sandor et al [28]) or a one-to-many mapping from the former to the latter (Lysenko et al [19], Huertas-Celdran et al [5], [20]). While Gonzales-Granadillo et al [12], Kanoun et al [16], Javornik et, al.…”
Section: Related Workmentioning
confidence: 99%
“…All the other previous works tackle simpler search problems by only focusing on a single mitigation class (Marsa-Maestre et al [21]), a one-to-one mapping from attack action classes to mitigation action classes (Sandor et al [28]) or a one-to-many mapping from the former to the latter (Lysenko et al [19], Huertas-Celdran et al [5], [20]). While Gonzales-Granadillo et al [12], Kanoun et al [16], Javornik et, al.…”
Section: Related Workmentioning
confidence: 99%
“…As a result of these assessments, we've structured the following categories or branches based on the above-mentioned identified weak areas in our growing architecture. They are organized into six groups: Malicious Applications, Misconfigurations, Data Alterations, Denial of Service (DoS) attacks and Distributed Denial of Services (DDoS) attacks, Data Outflow and Access Problems [14].…”
Section: Perspective Of Security Behavior and Lapsesmentioning
confidence: 99%
“…In this step, Clients may need to come back to the previous step, if an empty list is returned, that is, they must change their combinations of functional and non-functional requirements. Otherwise (a non empty list is returned), the non-functional requirements (such as price, response time and reliability) are used to select the most adequate service [2]- [4]. The last step is the invocation of the selected service.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, the process of service requesting has to be monitored by service managers to detect any unexpected problem and apply corrective strategies when necessary. Many related works [2]- [12] emphasize the importance of monitoring service requests and their QoS. In general, the approaches proposed [13]- [15] offer a high level of abstraction to monitor service and do not consider the granularity of service requests.…”
Section: Introductionmentioning
confidence: 99%