Grunt attack: Exploiting execution dependencies in microservices

X Gu, Q Wang, J Liu, J Wei - 2024 54th Annual IEEE/IFIP …, 2024 - ieeexplore.ieee.org
Loosely-coupled and lightweight microservices running in containers are likely to form
complex execution dependencies inside the system. The execution dependency arises …

Attack strategies and reliability analysis of Wireless Mesh Networks considering cascading failures

H Dui, J Zhai, X Fu - Reliability Engineering & System Safety, 2025 - Elsevier
Abstract Wireless Mesh Networks (WMNs) are vital to modern infrastructure, and attacks on
WMNs can lead to paralysis of coupled systems, causing significant social and economic …

Reducing Internal Collateral Damage from Distributed Denial of Service (DDoS) Attacks through Micro-Service Cloud Architecture

A Kumar, M Agarwal - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
Mitigating DDoS attacks poses a significant challenge for cyber security teams within victim
organizations, as these attacks directly target service availability. Most DDoS mitigation …

A Study of Response Time Instability of Microservices at High Resource Utilization in the Cloud

Q Wang, X Gu, C Pu - 2024 IEEE 6th International Conference …, 2024 - ieeexplore.ieee.org
Maintaining consistently low response times is a critical performance requirement for
mission-critical, web-facing applications (eg, e-commerce) that typically use microservices …

Reducing Internal Collateral Damage From DDoS Attacks Through Micro-Service Cloud Architecture

A Kumar, M Agarwal - IEEE Transactions on Information Forensics and …, 2025 - dl.acm.org
Mitigating DDoS attacks poses a significant challenge for cyber security teams within victim
organizations, as these attacks directly target service availability. Most DDoS mitigation …