DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Hyun | ko |
dc.contributor.author | Kim, Yongchul | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.contributor.author | Choi, Daeseon | ko |
dc.date.accessioned | 2018-01-22T02:05:16Z | - |
dc.date.available | 2018-01-22T02:05:16Z | - |
dc.date.created | 2017-12-18 | - |
dc.date.created | 2017-12-18 | - |
dc.date.created | 2017-12-18 | - |
dc.date.created | 2017-12-18 | - |
dc.date.issued | 2017-11 | - |
dc.identifier.citation | APPLIED SCIENCES-BASEL, v.7, no.11 | - |
dc.identifier.issn | 2076-3417 | - |
dc.identifier.uri | http://hdl.handle.net/10203/237174 | - |
dc.description.abstract | In this study, we propose an optimal cluster expansion-based intrusion-tolerant system (ITS) that can maintain quality of service (QoS) under a massive denial of service (DoS) attack. Our proposed scheme conserves resources while maintaining good QoS by optimally increasing and decreasing cluster size. To evaluate the performance of the proposed scheme, we use a CloudSim simulator and compare our proposed scheme with an existing conventional adaptive cluster transformation (ACT) scheme. Our simulation results show that the proposed scheme outperforms the conventional ACT scheme in terms of better QoS and lower resource consumption. | - |
dc.language | English | - |
dc.publisher | MDPI AG | - |
dc.title | Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks | - |
dc.type | Article | - |
dc.identifier.wosid | 000416794600085 | - |
dc.identifier.scopusid | 2-s2.0-85034646359 | - |
dc.type.rims | ART | - |
dc.citation.volume | 7 | - |
dc.citation.issue | 11 | - |
dc.citation.publicationname | APPLIED SCIENCES-BASEL | - |
dc.identifier.doi | 10.3390/app7111186 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Kim, Yongchul | - |
dc.contributor.nonIdAuthor | Choi, Daeseon | - |
dc.description.isOpenAccess | Y | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | intrusion-tolerant system | - |
dc.subject.keywordAuthor | optimal cluster expansion | - |
dc.subject.keywordAuthor | denial of service (DoS) | - |
dc.subject.keywordAuthor | virtual machine (VM) | - |
dc.subject.keywordAuthor | queuing theory | - |
dc.subject.keywordPlus | DESIGN | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.