Grunt attack: Exploiting execution dependencies in microservices
Loosely-coupled and lightweight microservices running in containers are likely to form
complex execution dependencies inside the system. The execution dependency arises …
complex execution dependencies inside the system. The execution dependency arises …
Attack strategies and reliability analysis of Wireless Mesh Networks considering cascading failures
Abstract Wireless Mesh Networks (WMNs) are vital to modern infrastructure, and attacks on
WMNs can lead to paralysis of coupled systems, causing significant social and economic …
WMNs can lead to paralysis of coupled systems, causing significant social and economic …
Reducing Internal Collateral Damage from Distributed Denial of Service (DDoS) Attacks through Micro-Service Cloud Architecture
A Kumar, M Agarwal - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
Mitigating DDoS attacks poses a significant challenge for cyber security teams within victim
organizations, as these attacks directly target service availability. Most DDoS mitigation …
organizations, as these attacks directly target service availability. Most DDoS mitigation …
A Study of Response Time Instability of Microservices at High Resource Utilization in the Cloud
Maintaining consistently low response times is a critical performance requirement for
mission-critical, web-facing applications (eg, e-commerce) that typically use microservices …
mission-critical, web-facing applications (eg, e-commerce) that typically use microservices …
Reducing Internal Collateral Damage From DDoS Attacks Through Micro-Service Cloud Architecture
A Kumar, M Agarwal - IEEE Transactions on Information Forensics and …, 2025 - dl.acm.org
Mitigating DDoS attacks poses a significant challenge for cyber security teams within victim
organizations, as these attacks directly target service availability. Most DDoS mitigation …
organizations, as these attacks directly target service availability. Most DDoS mitigation …