Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation.
Ronen Ben DavidAnat Bremler BarrPublished in: CLOSER (2021)
Keyphrases
- attack graphs
- attack graph
- penetration testing
- buffer overflow
- security vulnerabilities
- security risks
- denial of service
- dos attacks
- countermeasures
- multiscale
- neural network
- attack scenarios
- detection mechanism
- secret key
- genetic algorithm
- data sets
- block cipher
- power analysis
- authentication protocol
- risk assessment
- key exchange protocol
- lightweight
- website