Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation.
Ronen Ben DavidAnat Bremler BarrPublished in: CoRR (2021)
Keyphrases
- attack graphs
- attack graph
- penetration testing
- buffer overflow
- security vulnerabilities
- denial of service
- security risks
- dos attacks
- risk management
- risk assessment
- secret key
- denial of service attacks
- attack detection
- expert systems
- artificial intelligence
- digital watermark
- machine learning
- malicious users
- attack scenarios
- multiscale