2022
DOI: 10.1109/tcc.2020.3000674
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 28 publications
0
4
0
1
Order By: Relevance
“…Results demonstrating the effectiveness of the robust service mapping scheme in optimizing service allocation for multi-tenant clouds. [46] Theoretical analysis of cloud firewalls under bursty and correlated data traffic patterns, aiming to provide insights into their performance.…”
Section: Ref No Methodology Novelty Resultsmentioning
confidence: 99%
“…Results demonstrating the effectiveness of the robust service mapping scheme in optimizing service allocation for multi-tenant clouds. [46] Theoretical analysis of cloud firewalls under bursty and correlated data traffic patterns, aiming to provide insights into their performance.…”
Section: Ref No Methodology Novelty Resultsmentioning
confidence: 99%
“…Учитывая, что свойство самоподобия наблюдается в широких временных масштабах (например, при различном временном разрешении на уровне бит, пакетов, потоков и т.д. ), наличие в сигнале продолжительных атак и аномальной активности изменяет самоподобную природу трафика, приводит [4,[10][11], а также см. 9 Информация о различии ФР обрабатываемых процессов (если они доступны для обработки) при разном разрешении по времени может быть использована для модификации рассмотренных алгоритмов обнаружения/классификации КА и может привести к улучшению показателей классификации методами машинного обучения.…”
Section: постановка задачиunclassified
“…Denial of Service (DoS) attack has been one of the major threats to organizations worldwide. Recently, it has been shown that the scaling process of cloud computing is able to thwart the destruction power of a DoS attack [63]. However, the resource-constrained nature of edge computing exacerbates the risk of a successful DoS attack.…”
Section: Motivationmentioning
confidence: 99%