2015
DOI: 10.1016/j.entcs.2014.12.015
|View full text |Cite
|
Sign up to set email alerts
|

Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform

Abstract: Current ICT infrastructures are characterized by increasing requirements of reliability, security, performance, availability, adaptability. A relevant issue is represented by the scalability of the system with respect to the increasing number of users and applications, thus requiring a careful dimensioning of resources. Furthermore, new security issues to be faced arise from exposing applications and data to the Internet, thus requiring an attentive analysis of potential threats and the identification of stron… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…DOMINO runs the tests for each node by tracking each node's transmissions in the network. Therefore, the way the tests are computed might become time and resource consuming when the number of nodes is increased [12]. DOMINO's performance is assessed through the simulator NS.…”
Section: Related Workmentioning
confidence: 99%
“…DOMINO runs the tests for each node by tracking each node's transmissions in the network. Therefore, the way the tests are computed might become time and resource consuming when the number of nodes is increased [12]. DOMINO's performance is assessed through the simulator NS.…”
Section: Related Workmentioning
confidence: 99%
“…Jamming attacks have been widely investigated in the literature. Multiple authors have proposed several solutions to tackle the problem for a wide range of jamming attacks [7][8][9][10][11][12]. In [7], the authors present DOMINO, a piece of software installed in or near an Access Point (AP) in order to detect MAC layer greedy behaviour in 802.11 hotspots.…”
Section: Related Workmentioning
confidence: 99%
“…A number of Network Intrusion Detection Systems (NIDSs) have been presented in the literature to detect a wide range of jamming threats [7][8][9][10][11][12]. A NIDS can be classified as a signature-based NIDS (also known as misuse-based NIDS) or an anomaly-based NIDS.…”
Section: Introductionmentioning
confidence: 99%
“…However, the authentication server is one of the (powerful) nodes of the Secure! framework, which has been built with scalability [17] in mind so that its nodes can be easily adapted to sustain high computational loads.…”
Section: 4mentioning
confidence: 99%