Abstract
Cloud Computing is a large-set of resources and services offered through the Internet according to a on-demand self service model. In particular, the cloud elasticity allows customers to scale-up their applications in order to provide services to a larger number of end-users. The provided services are charged based on a pay-per-use business model. According to such a model, Distributed Denial of Service attacks can be transformed in a new breed of attacks, which target the cloud flexibility, in order to inflict fraudulent resource consumptions. In this paper, we proposed an approach to mitigate such new kind of threats in Cloud Computing, which have direct effects on the customer costs and not only on the service performance perceived by end-users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ficco, M., Tasquier, L., Di Martino, B.: Interconnection of federated clouds. In: Intelligent Distributed Computing VII, Studies in Computational Intelligence, 2014, vol. 511, pp. 243–248
Francois, J., Aib, I., Boutaba, R.: Firecol, a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking 20(6), 1828–1841 (2012)
Baig, Z.A., Binbeshr, F.: Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures. In: Proceedings of the International Conference on Cloud Computing and Big Data, Dec 2013, pp. 346–353
Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, 2012, pp. 535–539
Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 13(4), 737–751 (2014)
HinKhor, S., Nakao, A.: sPoW: On-demand cloud-based eDDoS mitigation mechanism. In: Proceedings of the 5th Workshop on Hot Topics in System Dependability, 2009, pp. 1–6
Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield—a two-steps mitigation technique against EDoS attacks in cloud computing. In: Proceedings of the 4th IEEE International Conference on Utility and Cloud Computing, 2011, pp. 49–56
Beitollahi, H., Deconinck, G.: Fosel: Filtering by helping an overlay secure layer to mitigate dos attacks. In: Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA), July 2008, pp. 19–28
Ping, D., Nakao, A.: DDoS defense as a network service. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Apr 2010, pp. 894–897
Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Int. J. Netw. Comput. Appl. 34, 1097–1107 (2011)
Amazon CloudWatch, Amazon Website, available at http://aws.amazon.com/cloudwatch/, May 2014
Yu, S., Tian, Y., Guo, S., Oliver Wu, D.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254
Ficco, M., Rak, M.: Intrusion tolerant approach for denial of service attacks to web services. In: Proceedings of the 1st International Conference on Data Compression, Communications and Processing (CCP), June 2011, pp. 285–292
Ficco, M., Rak, M.: Intrusion tolerance as a service: a SLA-based solution. In: Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER), Apr 2012, pp. 375–384
Ficco, M., Rak, M.: Intrusion tolerance of stealth DoS attacks to web services. In: Information Security and Privacy, LNCS, vol. 376, pp. 579–584, 2012
AlEroud, A., Karabatis, G.: Toward zero-day attack identification using linear data transformation techniques. In: Proceedings of the IEEE 7th International Conference on Software Security and Reliability (SERE), 2013, pp. 159–168
Amato, A., Venticinque, S.: Multi-objective decision support for brokering of cloud SLA. In: Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013, pp. 1241–1246
Ficco, M., Rak, M., Di Martino, B.: An intrusion detection framework for supporting SLA assessment in cloud computing. In: 4th International Conference on Computational Aspects of Social Networks (CASoN 2012), Sao Carlos, Brazil, Nov 2012, pp. 244–249
Ficco, M.: Security event correlation approach for cloud computing. J. High Perform. Comput. Networking 7(3), 173–185 (2013)
Joshi, B., Vijayan, A.S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), 2012, pp. 1–5
Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security, LNCS, vol. 7722, no. 2013, pp. 10–21
Acknowledgments
This research is partially supported by the European Community’s Seventh Framework Programme (FP7/2007-2013) under Grant Agreements no. 610795 (SPECS), as well as the MIUR under Projects “DISPLAY” (PON02_00485_3487784) and “MINIMINDS” (PON02_00485_3164061) of the public private laboratory “COSMIC” (PON02_00669).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Ficco, M., Rak, M. (2016). Economic Denial of Sustainability Mitigation in Cloud Computing. In: Rossignoli, C., Gatti, M., Agrifoglio, R. (eds) Organizational Innovation and Change. Lecture Notes in Information Systems and Organisation, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-319-22921-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-22921-8_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22920-1
Online ISBN: 978-3-319-22921-8
eBook Packages: Business and ManagementBusiness and Management (R0)