SoutheastCon 2021 2021
DOI: 10.1109/southeastcon45413.2021.9401839
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of DDoS Attacks on the Power Usage of Virtual Execution Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…In power system environment, with the access of a large number of service terminals, the data information of individual sensitive user nodes is easy to leak, which leads to the control rationality of information authentication instruction decline greatly. Due to the diversity of equipment and applications, power systems are becoming the main targets of cyberattacks such as DDoS [3] attacks, insider attacks [4], ransomware, fraud bureaus, etc. Unauthenticated attackers can pose a great challenge to the security of the power system through illegal access.…”
Section: Introductionmentioning
confidence: 99%
“…In power system environment, with the access of a large number of service terminals, the data information of individual sensitive user nodes is easy to leak, which leads to the control rationality of information authentication instruction decline greatly. Due to the diversity of equipment and applications, power systems are becoming the main targets of cyberattacks such as DDoS [3] attacks, insider attacks [4], ransomware, fraud bureaus, etc. Unauthenticated attackers can pose a great challenge to the security of the power system through illegal access.…”
Section: Introductionmentioning
confidence: 99%