Skip to main content
Log in

An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Security of cloud services is of utmost importance for contemporary cloud providers. In addition to the traditional malicious attacks that have targeted cloud datacenters in the past, new and persistent threats have changed the landscape of cyber-attacks in recent times. Economic Denial of Sustainability (EDoS) attacks are one of such variant attack types with serious implications and consequences. Such attacks exploit the scalability and elasticity characteristics of the cloud to enforce unwanted resource allocation with the aim of causing economic losses to the cloud service owner. In this paper, we present an experimental study to evaluate the effectiveness of the popular EDoS-Shield technique which is designed to mitigate EDoS attacks. The effectiveness of EDoS-Shield is studied in terms of the needed VM compute resources, response time, and CPU utilization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fox A., Griffith R., Joseph A., Katz R., Konwinski A., Lee G., Patterson D., Rabkin A., Stoica I.: Above the clouds: a Berkeley view of cloud computing. Dep. Electr. Eng. Comput. Sci. Univ. Calif. Berkeley Rep. UCBEECS 28, 13 (2009)

    Google Scholar 

  2. Mell P., Grance T.: The NIST definition of cloud computing. Natl. Inst. Stand. Technol. 53(6), 50 (2009)

    Google Scholar 

  3. IDC eXchange? “Blog Archive?” New IDC IT Cloud Services Survey: Top Benefits and Challenges

  4. Baig Z., Salah K.: Multi-agent pattern recognition mechanism for detecting distributed denial of service attacks. IET Inf. Secur. 4(1), 333–343 (2010)

    Article  Google Scholar 

  5. Hoff, C.: The economic denial of sustainability concept. http://rationalsecurity.typepad.com/blog/2008/11/index.html

  6. Sqalli, M.H.; Al-Haidari, F.; Salah, K.: EDoS-shield-a two-steps mitigation technique against edos attacks in cloud computing. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 49–56 (2011)

  7. VivinSandar S., Shenai S.: Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks. Int. J. Comput. Appl. 41(20), 11–16 (2012)

    Google Scholar 

  8. Khor, S.H.; Nakao, A.: Spow: on-demand cloud-based eddos mitigation mechanism. In: HotDep (Fifth Workshop on Hot Topics in System Dependability) (2009)

  9. Saini, B.; Somani, G.: Index page based EDoS attacks in infrastructure cloud. In: Recent Trends in Computer Networks and Distributed Systems Security, pp. 382–395 (2014)

  10. Salah K., Kahtani A.: Performance evaluation comparison of snort NIDS under Linux and Windows Server. Int. J. Netw. Comput. Appl. 33(1), 6–15 (2010)

    Article  Google Scholar 

  11. Kumar, M.N.; Sujatha, P.; Kalva, V.; Nagori, R.; Katukojwala, A.K.; Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 535–539 (2012)

  12. Yu, S.; Tian, Y.; Guo, S.; Wu, D.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distributed Sys. 25(9), 2245–2254 (2014)

  13. Salah, K.; El-Badawi, K.: Performance evaluation of interrupt-driven kernels in gigabit networks. In: Proceedings of the 2003 IEEE Conference on Global Telecommunications, (IEEE GLOBECOM 2003), San Francisco, USA, pp. 3953-3957, 1–5 Dec (2003)

  14. Alosaimi, W.; Al-Begain, K.: A new method to mitigate the impacts of the economical denial of sustainability attacks against the cloud. In: Proceedings of the 14th Annual Post Graduates Symposium on the convergence of Telecommunication, Networking and Broadcasting (PGNet), pp. 116–121 (2013)

  15. Al-Haidari, F.; Sqalli, M.H.; Salah, K.: Enhanced EDoS-Shield for mitigating EDoS attacks originating from spoofed IP addresses. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1167–1174 (2012)

  16. Al-Haidari F., Sqalli M.H., Salah K.: Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services. Arab. J. Sci. Eng. 40, 773–785 (2015)

    Article  Google Scholar 

  17. Somani, G.; Gaur, M.; Sanghi, D.: DDoS/EDoS attack in cloud: affecting everyone out there!. In: SIN (2015)

  18. Masood, M.; Anwar, Z.; Raza, S.; Hur, M.: EDoS armor: a cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments. In: 2013 16th International Multi Topic Conference (INMIC) (2013)

  19. Alosaimi, W.; Al-Begain, K.: An enhanced economical denial of sustainability mitigation system for the cloud. In: 2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST), pp. 19–25 (2013)

  20. CloudPlatform—Cloud Orchestration to support Infrastructure-as-a-Service. http://www.citrix.com/content/citrix/en_us/products/cloudplatform/overview.html

  21. Citrix XenServer—Efficient Server Virtualization Software. http://www.citrix.com/content/citrix/en_us/products/xenserver/overview.html

  22. CentOS—The Community ENTerprise Operating System. http://www.centos.org/

  23. Apache HTTP Server. http://httpd.apache.org/

  24. NetScaler Application Delivery Controller–Application security and cloud scalability. http://www.citrix.com/content/citrix/en_us/products/netscaler-application-delivery-controller/overview.html

  25. Apache JMeter. http://jmeter.apache.org/

  26. Custom Plugins for Apache JMeter. JMeter-Plugins.org. http://jmeter-plugins.org/

  27. netfilter—firwalling, NAT, and packet mangling for linux. http://www.netfilter.org/

  28. WampServer. http://www.wampserver.com/en/

  29. Secureimage—PHP CAPTCHA. http://www.phpcaptcha.org/

  30. XenCenter. http://www.xenserver.org/overview-xenserver-open-source-virtualization/download.html

  31. Firebug. http://getfirebug.com/

  32. 000Webhost.com. http://www.000webhost.com/templates/Games/template_45

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaled Salah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alsowail, S., Sqalli, M.H., Abu-Amara, M. et al. An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud. Arab J Sci Eng 41, 5037–5047 (2016). https://doi.org/10.1007/s13369-016-2210-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-016-2210-7

Keywords

Navigation