2015
DOI: 10.1016/j.cie.2015.06.009
|View full text |Cite
|
Sign up to set email alerts
|

Topological analysis of cloud service connectivity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…For both perspectives and most layers, there are historical examples of attacks and failures with impact on connectivity [5,8]. Some attacks on higher layers, such as BGP misconfiguration, affect the robustness of AS-level and IP-level graphs without damage to the underlying physical infrastructure and interconnections of the lower layers.…”
Section: Layer Models and Graph Models Of The Internetmentioning
confidence: 99%
See 2 more Smart Citations
“…For both perspectives and most layers, there are historical examples of attacks and failures with impact on connectivity [5,8]. Some attacks on higher layers, such as BGP misconfiguration, affect the robustness of AS-level and IP-level graphs without damage to the underlying physical infrastructure and interconnections of the lower layers.…”
Section: Layer Models and Graph Models Of The Internetmentioning
confidence: 99%
“…In this equation for the Symmetry Ratio SR [118], # λ is the number of distinct eigenvalues of the adjacency matrix, and D = max m,n∈V d (m,n) the Diameter (Section 6.1). For lowsymmetry networks, SR ∈ [8,15] holds and for high-symmetry networks, SR ∈ [1,3]. In the latter case, all nodes are similarly important, and the network is more Traffic Robust against attacks as measured by the Share of Delivered Data Flow X(ζ) (Section 7.7), which then have a similar impact as failures.…”
Section: Symmetry Ratiomentioning
confidence: 99%
See 1 more Smart Citation
“…Topology refers to the edge-based and structural attributes of a network or a graph (Zaki and Meira, 2014, p. 93): the various entities, such as routers, and their interconnections. The study of Internet topology enables the evaluation of performance and vulnerabilities of the Internet infrastructure and individual services in the case of failures or intentional attacks, with increasing importance in light of present cybercrime and cyber warfare (Albert and Barabási, 2000;Cohen et al 2000;Cohen et al 2001;Doyle et al, 2005;Xiao et al, 2008;Sterbenz et al 2010;Sterbenz et al 2013;Doerr and Kuipers, 2014;Baumann and Fabian, 2014;Fabian et al 2015). Internet maps are also important for the development of more effective routing algorithms and security and privacy mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, cloud security has the influence in educational institutions. Benjamin Fabian et al discussed topological analysis of cloud service connectivity [21]. The authors focused on the network reachability of cloud services.…”
Section: Related Workmentioning
confidence: 99%