최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합보안논문지 = Convergence security journal, v.23 no.5, 2023년, pp.81 - 89
김리영 (성신여자대학교 미래융합기술공학과) , 김성민 (성신여자대학교 융합보안공학과)
Kubernetes is a representative open-source software for container orchestration, playing a crucial role in monitoring and managing resources allocated to containers. As container environments become prevalent, security threats targeting containers continue to rise, with resource exhaustion attacks b...
박재현, "황금기 맞이한 국내 쿠버네티스 시장,"?http://www.itdaily.kr/news/articleView.html?idxno212840, 2023.
Kubernetes - Horizontal Pod Autoscaler, https://kubernetes.io/ko/docs/tasks/run-application/horizontal-pod-autoscale/, 접속 : 2023-09-27.
Google Cloud, "Threat Horizons Cloud Threat?Intelligence 2021," https://bit.ly/41THxbT, 2021
C. N. C. Foundation, "Cloud native survey 2020,"?https://www.cncf.io/wp-content/uploads/2020/11/CNCF_Survey_Report_2020.pdf, 2020.
A. A. Khaleq and I. Ra, "Intelligent Autoscaling of?Microservices in the Cloud for Real-Time?Applications," in IEEE Access, vol. 9, pp.?35464-35476, 2021.
S. Horovitz and Y. Arian, "Efficient Cloud Auto-Scaling with SLA Objective Using Q-Learning,"?2018 IEEE 6th International Conference on Future?Internet of Things and Cloud (FiCloud), pp. 85-92,?2018.
T. Veni and S. Mary Saira Bhanu, "Auto-scale:?automatic scaling of virtualised resources using?neuro-fuzzy reinforcement learning approach,"?International Journal of Big Data Intelligence 3.3,?pp. 145-153, 2016.
J. V. Bibal Benifa and D. Dejey, "Rlpas: Reinforcement?learning-based proactive auto-scaler for resource?provisioning in cloud environment," Mobile Networks?and Applications 24, pp. 1348-1363, 2019.
F. Rossi, M. Nardelli and V. Cardellini, "Horizontal?and Vertical Scaling of Container-Based Applications?Using Reinforcement Learning," 2019 IEEE 12th?International Conference on Cloud Computing?(CLOUD), pp. 329-338, 2019.
Z. Zhang, T. Wang, A. Li and W. Zhang, "Adaptive?Auto-Scaling of Delay-Sensitive Serverless?Services with Reinforcement Learning," 2022?IEEE 46th Annual Computers, Software, and?Applications Conference (COMPSAC), pp.?866-871, 2022.
C. Priebe, D. Muthukumaran, D. O'Keeffe, D.?Eyers, B. Shand, R. Kapitza and P. Pietzuch,?"Cloudsafetynet: Detecting data leakage between?cloud tenants," Proceedings of the 6th edition?of the ACM Workshop on Cloud Computing?Security, pp. 117-128, 2014.
이준희, 남재현, and 김진우, "컨테이너 환경에서의 호스트 자원 고갈 공격 영향 분석,"?정보보호학회논문지 3 .1, pp. 87-97, 2023.
M. Musch, C. Wressnegger, M. Johns and K.?Rieck, "Thieves in the browser: Web-based?cryptojacking in the wild," Proceedings of the?14th International Conference on Availability,?Reliability and Security, pp. 1-10, 2019.
F. Gomes and M. Correia, "Cryptojacking Detection?with CPU Usage Metrics," 2020 IEEE 19th?International Symposium on Network Computing?and Applications (NCA), pp. 1-10, 2020.
A. D. Yulianto, P. Sukarno, A. A. Warrdana and?M. A. Makky, "Mitigation of Cryptojacking Attacks?Using Taint Analysis," 2019 4th International?Conference on Information Technology, Information?Systems and Electrical Engineering (ICITISEE),?pp. 234-238, 2019.
R. R. Karn, P. Kudva, H. Huang, S. Suneja?and I. M. Elfadel, "Cryptomining Detection in?Container Clouds Using System Calls and?Explainable Machine Learning," in IEEE Transactions?on Parallel and Distributed Systems, vol. 32,?no. 3, pp. 674-691, 2021.
M. Zhan, Y. Li, H. Yang, G. Yu, B. Li and?W. Wang, "Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers,"?in IEEE Transactions on Services Computing,?vol. 16, no. 3, pp. 1686-1697, 2023.
A. F. Baarzi, G. Kesidis, D. Fleck and A.?Stavrou, "Microservices made attack-resilient?using unsupervised service fissioning," Proceedings?of the 13th European workshop on Systems?Security, pp. 31-36, 2020.
J. Castro, N. Laranjeiro and M. Vieira, "Detecting?DoS Attacks in Microservice Applications:?Approach and Case Study," Proceedings of the?11th Latin-American Symposium on Dependable?Computing, pp. 73-78, 2022.
eBPF, https://ebpf.io/, 접속 : 2023-09-27.
M. Caprolu, S. Raponi, G. Oligeri and R. Di?Pietro, "Cryptomining makes noise: Detecting?cryptojacking via machine learning," Computer?Communications 171, pp. 126-139, 2021.
H. N. C. Neto, M. A. Lopez, N. C. Fernandes?and D. M. Mattos, "Minecap: super incremental?learning for detecting and blocking cryptocurrency?mining on software-defined networking," Annals?of Telecommunications 75, pp. 121-131, 2020.
A. Gangwal, S. G. Piazzetta, G. Lain and M.?Conti, "Detecting covert cryptomining using?hpc," Cryptology and Network Security: 19th?International Conference, pp. 344-364, 2020.
H. Darabian, S. Homayounoot, A. Dehghantanha,?S. Hashemi, H. Karimipour, R. M. Parizi and?K. K. R. Choo, "Detecting cryptomining?malware: a deep learning approach for static?and dynamic analysis," Journal of Grid?Computing 18, pp. 293-303, 2020.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.