References
- Sysdig,The fifth annual Sysdig Cloud-Native Security and Usage Re- port.2022
- Ben David et al. Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation,2021
- Kubernetes, The 4C's of Cloud Native security.[online].Available:https://kubernetes.io/docs/concepts/security/overview/the-4c-s-of-cloud-native-security
- Xiaoqiong Xu et al,Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism.2019, [online]Avaiable:https://www.sciencedirect.com/science/article/pii/S2352864819301440
- Liu et al, A clusterized firewall framework for cloud computing. In Pro- ceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10-14 June 2014; pp. 3788-3793.
- Monge et al, Entropy-Based Economic Denial of Sustain- ability Detection. Entropy 2017, 19, 649.[online] Available: https://doi.org/10.3390/e19120649
- Viktor Danielsen, Detecting Yo-Yo DoS attack in acontainerbased environment,2021,[online] Available:https://hdl.handle.net/11250/2774518
- Zeebaree, Subhi Rafeeq, Karwan Jacksi, and Rizgar R. Zebari. "Impact analysis of SYN flood DDoS attack on HAProxy and NLB cluster-based web servers." Indones. J. Electr. Eng. Comput. Sci 19.1 (2020): 510-517. https://doi.org/10.11591/ijeecs.v19.i1.pp505-512
- Carrion, Carmen. "Kubernetes scheduling: Taxonomy, ongoing issues and challenges." ACM Computing Surveys (CSUR) (2022).
- Mondal, Subrota Kumar, et al. "Kubernetes in IT administration and serverless computing: An empirical study and research challenges." The Journal of Supercomputing 78.2 (2022): 2937-2987. https://doi.org/10.1007/s11227-021-03982-3
- Netto, Hylson, et al. "Incorporating the Raft consensus protocol in containers managed by Kubernetes: An evaluation." International Journal of Parallel, Emergent and Distributed Systems 35.4 (2020): 433-453. https://doi.org/10.1080/17445760.2019.1608989
- Xiong, Huanliang, et al. "Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms." Future Internet 14.2 (2022): 47.
- Minna, Francesco, et al. "Understanding the security implications of kubernetes networking." IEEE Security & Privacy 19.05 (2021): 46-56. https://doi.org/10.1109/MSEC.2021.3094726
- Shamim, Shazibul Islam. "Mitigating security attacks in kubernetes manifests for security best practices violation." Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2021.
- Ylli, Enkli, Igli Tafa, and Flavia Marku. "Examining the Server's Load Average When Trying to Attack the Firewall." Proceedings of Sixth International Congress on Information and Communication Technology. Springer, Singapore, 2022.
- Mostamand Kashi, Meraj. Implementation of an approach to mitigate Yo-Yo attack in cloud auto-scaling mechanism. MS thesis. OsloMet-storbyuniversitetet, 2022.