2011
DOI: 10.1016/j.comnet.2010.07.012
|View full text |Cite
|
Sign up to set email alerts
|

Optimal response to attacks on the open science grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 13 publications
0
22
0
Order By: Relevance
“…5) Cloud-computing-heterogeneity through cluster sizes: In cluster (or grid, or volunteer) computing [17], each cluster of CPUs in the cloud constitutes a type. Any two computers in the same cluster can communicate at faster rates than those in different clusters.…”
Section: Motivation Of the Models And Instantiationsmentioning
confidence: 99%
See 1 more Smart Citation
“…5) Cloud-computing-heterogeneity through cluster sizes: In cluster (or grid, or volunteer) computing [17], each cluster of CPUs in the cloud constitutes a type. Any two computers in the same cluster can communicate at faster rates than those in different clusters.…”
Section: Motivation Of the Models And Instantiationsmentioning
confidence: 99%
“…We can motivate heterogeneous epidemics in various ways: 1) Proximity-based spread, where locality causes heterogeneity; 2) Software/protocol diversity [11]- [13], which has even been envisioned as a defense mechanism against future threats [11]; 3) IP space diversity, e.g., worms that use the IP masks of specific Autonomous Systems (AS) to increase their yield [14]; 4) Differing clique sizes, especially for epidemics for which there is an underlying social network graph [3], [15]; 5) Behavioral patterns, specifically how much risky behaviour every agent engages in [16]; 6) Clusters in cloud computing [17]; 7) Technology adoption, belief-formation over social media, and health care [18]- [22].…”
Section: Introductionmentioning
confidence: 99%
“…The scale and scope of the diverse, and autonomous sites and use groups and the nature of the partnerships to supply the internationally integrated system for many of the science collaborations means that any banning or removal activities have wide impact. The actions taken to mitigate and respond to threats and incidents benefit from deep attention to the context and risks in the endto-end eco-system [31].…”
Section: Operationsmentioning
confidence: 99%
“…The list of these predetermined destinations can be further manipulated by a cyber-attacker to propagate the cyber-attack to other PMUs. The propagation of the cyber-attacks in shared communication networks has been also studied in [8]- [13]. Furthermore, it has been reported that the communication network shows poor network security and insufficient software security [14].…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [13] have formulated an optimization model to avoid propagation of the cyber-attacks in open-science computer network where collaboration and communication exist among network sites. The optimization model is a mixed integer linear programming problem, which determines the sites to be disconnected from the network to maximize the number of users connected to the network resources.…”
Section: Introductionmentioning
confidence: 99%