Generating Realistic Attack Data for Microservices: Framework and Case Study
Abstract
References
Index Terms
- Generating Realistic Attack Data for Microservices: Framework and Case Study
Recommendations
Detecting DoS Attacks in Microservice Applications: Approach and Case Study
LADC '22: Proceedings of the 11th Latin-American Symposium on Dependable ComputingA microservices-based architecture decreases the complexity of developing new systems, making them highly scalable and manageable. However, its distributed nature, the high granularity of services, and the large attack surface increase the need to ...
Microservices made attack-resilient using unsupervised service fissioning
EuroSec '20: Proceedings of the 13th European workshop on Systems SecurityApplication-layer DoS attacks are increasing as the number of cloud-deployed microservice applications is increasing. The attacker tries to exhaust computing resources and brings the nominal applications down by exploiting application-layer ...
Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to several security attacks that can affect overall network performance. Therefore, security is the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 274Total Downloads
- Downloads (Last 12 months)274
- Downloads (Last 6 weeks)32
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatGet Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in