Security as a Dimension of Quality of Service in Active Service Environments
AMS '01 Proceedings of the Third Annual International Workshop on Active Middleware Services
A Bayesian game approach for intrusion detection in wireless ad hoc networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Remote timing attacks are practical
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Game theoretic models for detecting network intrusions
Computer Communications
Security and QoS Self-Optimization in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Exploring the security requirements for quality of service in combined wired and wireless networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis
IEEE/ACM Transactions on Networking (TON)
Journal of Network and Computer Applications
Improving the SLA-Based management of qos for secure multimedia services
MMNS'05 Proceedings of the 8th international conference on Management of Multimedia Networks and Services
IEEE Communications Surveys & Tutorials
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Different security measures have emerged to encounter various Internet security threats, ensuring a certain level of protection against them. However, this does not come without a price. Indeed, there is a general agreement that high security measures involve high amount of resources, ultimately impacting the perceived Quality of Service (QoS). The objective of this paper is to define a framework, dubbed QoS2, that provides means to find a tradeoff between security requirements and their QoS counterparts. The QoS2 framework is based on the multiattribute decision-making theory. The performance of the QoS2 framework is evaluated through computer simulations. A use-case considering worm e-mail detection is used in the performance evaluation. Copyright © 2012 John Wiley & Sons, Ltd.