Skip to main content

Economic Denial of Sustainability Mitigation in Cloud Computing

  • Conference paper
  • First Online:
Organizational Innovation and Change

Part of the book series: Lecture Notes in Information Systems and Organisation ((LNISO,volume 13))

Abstract

Cloud Computing is a large-set of resources and services offered through the Internet according to a on-demand self service model. In particular, the cloud elasticity allows customers to scale-up their applications in order to provide services to a larger number of end-users. The provided services are charged based on a pay-per-use business model. According to such a model, Distributed Denial of Service attacks can be transformed in a new breed of attacks, which target the cloud flexibility, in order to inflict fraudulent resource consumptions. In this paper, we proposed an approach to mitigate such new kind of threats in Cloud Computing, which have direct effects on the customer costs and not only on the service performance perceived by end-users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ficco, M., Tasquier, L., Di Martino, B.: Interconnection of federated clouds. In: Intelligent Distributed Computing VII, Studies in Computational Intelligence, 2014, vol. 511, pp. 243–248

    Google Scholar 

  2. Francois, J., Aib, I., Boutaba, R.: Firecol, a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking 20(6), 1828–1841 (2012)

    Article  Google Scholar 

  3. Baig, Z.A., Binbeshr, F.: Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures. In: Proceedings of the International Conference on Cloud Computing and Big Data, Dec 2013, pp. 346–353

    Google Scholar 

  4. Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, 2012, pp. 535–539

    Google Scholar 

  5. Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 13(4), 737–751 (2014)

    Google Scholar 

  6. HinKhor, S., Nakao, A.: sPoW: On-demand cloud-based eDDoS mitigation mechanism. In: Proceedings of the 5th Workshop on Hot Topics in System Dependability, 2009, pp. 1–6

    Google Scholar 

  7. Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield—a two-steps mitigation technique against EDoS attacks in cloud computing. In: Proceedings of the 4th IEEE International Conference on Utility and Cloud Computing, 2011, pp. 49–56

    Google Scholar 

  8. Beitollahi, H., Deconinck, G.: Fosel: Filtering by helping an overlay secure layer to mitigate dos attacks. In: Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA), July 2008, pp. 19–28

    Google Scholar 

  9. Ping, D., Nakao, A.: DDoS defense as a network service. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Apr 2010, pp. 894–897

    Google Scholar 

  10. Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Int. J. Netw. Comput. Appl. 34, 1097–1107 (2011)

    Article  Google Scholar 

  11. Amazon CloudWatch, Amazon Website, available at http://aws.amazon.com/cloudwatch/, May 2014

  12. Yu, S., Tian, Y., Guo, S., Oliver Wu, D.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254

    Google Scholar 

  13. Ficco, M., Rak, M.: Intrusion tolerant approach for denial of service attacks to web services. In: Proceedings of the 1st International Conference on Data Compression, Communications and Processing (CCP), June 2011, pp. 285–292

    Google Scholar 

  14. Ficco, M., Rak, M.: Intrusion tolerance as a service: a SLA-based solution. In: Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER), Apr 2012, pp. 375–384

    Google Scholar 

  15. Ficco, M., Rak, M.: Intrusion tolerance of stealth DoS attacks to web services. In: Information Security and Privacy, LNCS, vol. 376, pp. 579–584, 2012

    Google Scholar 

  16. AlEroud, A., Karabatis, G.: Toward zero-day attack identification using linear data transformation techniques. In: Proceedings of the IEEE 7th International Conference on Software Security and Reliability (SERE), 2013, pp. 159–168

    Google Scholar 

  17. Amato, A., Venticinque, S.: Multi-objective decision support for brokering of cloud SLA. In: Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013, pp. 1241–1246

    Google Scholar 

  18. Ficco, M., Rak, M., Di Martino, B.: An intrusion detection framework for supporting SLA assessment in cloud computing. In: 4th International Conference on Computational Aspects of Social Networks (CASoN 2012), Sao Carlos, Brazil, Nov 2012, pp. 244–249

    Google Scholar 

  19. Ficco, M.: Security event correlation approach for cloud computing. J. High Perform. Comput. Networking 7(3), 173–185 (2013)

    Article  Google Scholar 

  20. Joshi, B., Vijayan, A.S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), 2012, pp. 1–5

    Google Scholar 

  21. Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security, LNCS, vol. 7722, no. 2013, pp. 10–21

    Google Scholar 

Download references

Acknowledgments

This research is partially supported by the European Community’s Seventh Framework Programme (FP7/2007-2013) under Grant Agreements no. 610795 (SPECS), as well as the MIUR under Projects “DISPLAY” (PON02_00485_3487784) and “MINIMINDS” (PON02_00485_3164061) of the public private laboratory “COSMIC” (PON02_00669).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimo Ficco .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ficco, M., Rak, M. (2016). Economic Denial of Sustainability Mitigation in Cloud Computing. In: Rossignoli, C., Gatti, M., Agrifoglio, R. (eds) Organizational Innovation and Change. Lecture Notes in Information Systems and Organisation, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-319-22921-8_18

Download citation

Publish with us

Policies and ethics