2017
DOI: 10.3390/app7111186
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks

Abstract: Abstract:In this study, we propose an optimal cluster expansion-based intrusion-tolerant system (ITS) that can maintain quality of service (QoS) under a massive denial of service (DoS) attack. Our proposed scheme conserves resources while maintaining good QoS by optimally increasing and decreasing cluster size. To evaluate the performance of the proposed scheme, we use a CloudSim simulator and compare our proposed scheme with an existing conventional adaptive cluster transformation (ACT) scheme. Our simulation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 15 publications
1
11
0
Order By: Relevance
“…Fig. 6 shows confirmation that (0, 2), (4,5), and (7,8) The result of confirming the performance of the learned Siamese-CNN is as shown in Table 15, Table 16. The confusion matrix for the performance is shown in Fig.…”
Section: B Experimental Resultssupporting
confidence: 63%
See 1 more Smart Citation
“…Fig. 6 shows confirmation that (0, 2), (4,5), and (7,8) The result of confirming the performance of the learned Siamese-CNN is as shown in Table 15, Table 16. The confusion matrix for the performance is shown in Fig.…”
Section: B Experimental Resultssupporting
confidence: 63%
“…Intrusion detection systems are systems that detect and block abnormal behavior by comparing normal and abnormal cyberattack patterns [7,8]. In Laskov et al [9], various machine learning algorithms such as Decision Tree, K-Nearest Neighbor (K-NN), Multi-Layer Perceptron (MLP), K-means, and Support Vector Machine (SVM) were applied to intrusion detection.…”
Section: B Intrusion Detection Related Researchmentioning
confidence: 99%
“…Microsegmenting virtual servers on a physical server is possible via the use of tools such as VMWare NSX, where virtual servers can be microsegmented at the virtual network interface card (vNIC) level with firewall rules. However, as Kwon et al [13] explained, traditional security measures such as firewalls are still vulnerable to zero-day exploits. Intrusion tolerant systems (ITSs) are able to solve this problem by maintaining the quality of service even while the systems are under attack.…”
Section: Microsegmentation and Protection Of Virtual Machinesmentioning
confidence: 99%
“…Intrusion detection is an important problem for both physical space [20][21][22] and cyberspace [23,24], for safety and security reasons. There are numerous previous studies attempting to address the difficulties of railway clearance intrusion detection.…”
Section: Related Workmentioning
confidence: 99%