2019
DOI: 10.1016/j.comcom.2019.07.002
|View full text |Cite
|
Sign up to set email alerts
|

Detection of economic denial of sustainability (EDoS) threats in self-organizing networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3
1

Relationship

3
7

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 56 publications
0
5
0
Order By: Relevance
“… DCIS will also be highly correlated with TRD and CDA. It is safe to assume that a high dependency on CIS infrastructure is linked to a higher chance of collateral damage should this infrastructure be attacked [ 83 ]. …”
Section: Mission-level Cysas-s3mentioning
confidence: 99%
“… DCIS will also be highly correlated with TRD and CDA. It is safe to assume that a high dependency on CIS infrastructure is linked to a higher chance of collateral damage should this infrastructure be attacked [ 83 ]. …”
Section: Mission-level Cysas-s3mentioning
confidence: 99%
“…The characteristics and impact of EDoS are illustrated in Figure 2. An effect of EDoS attacks is that it becomes necessary to scale-up and scale-out the deployed environment resource by adding additional computational resources when the request packets of the attacker are consequently generated, flooding the resource [24]. Moreover, Figure 3 illustrates the CPU utilization of EDoS attacks in multi-variate time series.…”
Section: Edos Attack On Networkmentioning
confidence: 99%
“…As Jajodia et al stated in [27]: to protect critical network infrastructures and missions, we must understand not only the vulnerabilities of each individual system, but also their inter-dependencies and how they support missions, which gains difficulty when operating on emerging technological ecosystems [28,29], combining the perception of both insider and outsider threats [30] or facing adversarial evasion tactics [31,32] . At the same time, they proposed a framework to obtain mission-centric SA (Cauldron) combining data fusion, network paths of vulnerabilities, alert correlation, mission impact analysis and recommended reactive/proactive mitigation actions [33,34].…”
Section: Mission-centric Cyber Situational Awarenessmentioning
confidence: 99%