{"id":352,"date":"2024-04-22T18:20:54","date_gmt":"2024-04-22T18:20:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shadowyseth\/?page_id=352"},"modified":"2024-04-22T18:28:16","modified_gmt":"2024-04-22T18:28:16","slug":"article-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/shadowyseth\/article-2\/","title":{"rendered":"Article 2"},"content":{"rendered":"\n<p>How to classificate the Denial of Wallet<br>attacks.<br>This journal talks about the classification of the denial of wallet attacks that happen on<br>serverless application traffic. And how the attacks can affect the people in the world. I will try to<br>explain how they affect and different nets we use to protect the people.<br>For the topic that relates to the principles of social sciences, I think it talks about<br>how people make serverless functions that can target discrete tasks. The reason for this to to<br>find the information they want and they can take it without people knowing. They can do this to<br>people they don&#8217;t like or companies they don&#8217;t like.<br>Next, the research in question or hypothesis I think would be how they mitigate<br>techniques when it comes to DoS attacks. They write functions that can perform discrete target<br>tasks, timeout limits, set limits on disk usage, set throttling on APIP calls if requested, enforce<br>proper access, and it can use APIs, models, and libraries. I find this odd how does this help<br>against or does it help with DoS attacks because it sounds like it helps with DoS attacks. I find<br>this very odd when reading this.<br>For the methods used, I think they use different ones when explaining how they research<br>it. They talk about different attacks. They talk about how a Serverless attack surface happens<br>which starts with creating a URL link while others have to use AWS to link a function that leads<br>to an API Gateway. But it is a way to get to the endpoint which could execute a function that<br>could lead to an attack that the BoW could manifest. This attack can use vulnerabilities that<br>target the APIs. These attacks can flood the API endpoints to the point that requests start to<br>drive the cost up. This is used to teach developers who are in training and to teach them how to<br>deal with it. And they get to learn how to fix the problem and how to deal with it. And with this <\/p>\n\n\n\n<p>research, they show the people date by dealing with it hands-on and show how to fix the<br>problem on the spot.<br>I will be talking about the data and analysis done for the data. To me, there is a good one<br>they did to show for data which is the SqeezeNet. They talk about how the SqeezeNet has<br>60.4% top-1 classification accuracy when it comes to the ImageNet dataset. They mainly use<br>three following strategies. First, they have to replace 3&#215;3 filters with the 1&#215;1 filters. Next, they<br>had to decrease the number of inputs that go into the 3&#215;3 filters. Finally, they had to<br>downsample the late that was in the network so that it could convolution the layers then which<br>would have a large activation. When they did this it was on a 510x smaller scale compared to<br>the AlexNet. They were able to get data doing this this way. They did other text but they don&#8217;t<br>show steps like this did with the SqeezeNet. They did a test with the xception which they did a<br>kernel mapping cross channel then they did another test with MobileNet which was networks<br>with shortcut connections.<br>I think this relates to the PowerPoint because it shows how we try to protect people<br>when it comes to the online world. It shows how we do tests and find ways to fix it if there is a<br>problem.<br>As the challenge, I would say is finding the problem. We do test with different times of<br>net that it can take some time to understand the problem and explain how to fix it then actually<br>fix the problem. To me that would take some time to fix.<br>To me how this would contribute to society would be how we can fix the problems with<br>the Denial of Wallet attacks on the serverless application traffic. We have different net that can<br>detect them and show how we can fix them if we can fix them that is how I see how it would<br>help society. If the problem gets fixed or patched then those people will be protected for a while<br>until the problem arises again then people will come out with a new patch which would have to<br>be downloaded and the cycle will go.<\/p>\n\n\n\n<p>Work Cited<br>Kelly, D., Glavin, F. G., &amp; Barrett, E. (2024, March 23). Downet-classification of<br>denial-of-wallet attacks on serverless application traffic. OUP Academic.<br>https:\/\/academic.oup.com\/cybersecurity\/article\/10\/1\/tyae004\/7634012?searchresult=1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to classificate the Denial of Walletattacks.This journal talks about the classification of the denial of wallet attacks that happen onserverless application traffic. And how the attacks can affect the people in the world. I will try toexplain how they affect and different nets we use to protect the people.For the topic that relates to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shadowyseth\/article-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28348,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/352"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/users\/28348"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/352\/revisions"}],"predecessor-version":[{"id":368,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/352\/revisions\/368"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/media?parent=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}