Advertisement

Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment

  • Parminder Singh
  • Shafiq Ul RehmanEmail author
  • Selvakumar Manickam
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1132)

Abstract

As many organizations are adopting cloud computing as this allows them to be more agile, flexible and efficient. Nevertheless, as with any new technologies, cloud computing also suffers from various issues especially in security and privacy. Distributed Denial of Service (DDoS) attack saturates server resources, e.g. web server, by flooding it with fake requests. This renders the server inaccessible to legitimate users. Nevertheless, if the server is hosted as a cloud service, DDoS attack will not be effective due to the elasticity nature of the cloud server. Thus, a new variant of the DDoS attack, called Economic Denial of Sustainability (EDoS) attack, has emerged. Since the cloud service is based on “pay-per-use” model, EDoS attack endeavors to scale up the resource usage over time to the point the purveyor of the server is financially incapable of sustaining the service due to the incurred unaffordable usage charges. The implication of EDoS attack is a major security implication as more elastic cloud services are being deployed. A new mechanism, EDoS Mitigation Mechanism (EMM), is proposed to address these shortcomings using OpenFlow and statistical techniques, i.e. Hellinger Distance and Entropy. The experiments clearly showed that EMM is able to detect and mitigate EDoS attacks effectively without the need for additional resource requirements.

Keywords

Anomaly detection technique Cloud computing DDoS attack EDoS attack Mitigation mechanisms Cyber security 

Notes

Acknowledgments

This research was supported by National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), Malaysia. In collaboration with ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design (SUTD), Singapore.

References

  1. 1.
    Strømmen-Bakhtiar, A.: Digital economy, business models, and cloud computing. In: Global Virtual Enterprises in Cloud Computing Environments, pp. 19–44 (2019)CrossRefGoogle Scholar
  2. 2.
    Brintha, N.C., Winowlin Jappes, J.T., Sukumaran, J.: Integrating SMEs through cloud: an industrial revolution. In: Organizational Transformation and Managing Innovation in the Fourth Industrial Revolution, pp. 143–164 (2019)Google Scholar
  3. 3.
    Adamov, A., Erguvan, M.: The truth about cloud computing as new paradigm in IT. In: IEEE International Conference on Application of Information and Communication Technologies, pp. 1–3 (2009)Google Scholar
  4. 4.
    Bhardwaj, S., Jain, L., Jain, S.: Cloud computing: a study of infrastructure as a service (IAAS). Int. J. Eng. Inf. Technol. 2(1), 60–63 (2010)Google Scholar
  5. 5.
    Ficco, M.: Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? Inf. Sci. 1(476), 474–490 (2019)CrossRefGoogle Scholar
  6. 6.
    Bhushan, K., Gupta, B.B.: Network flow analysis for detection and mitigation of fraudulent resource consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools Appl. 78(4), 4267–4298 (2019)CrossRefGoogle Scholar
  7. 7.
    Singh, P., Manickam, S., Rehman, S.U.: A survey of mitigation techniques against economic denial of sustainability (EDoS) attack on cloud computing architecture. In: 3rd IEEE International Conference on Reliability, Infocom Technologies, and Optimization (ICRITO) (Trends and Future Directions), pp. 1–4 (2014)Google Scholar
  8. 8.
    Hoff, C.: Cloud Computing Security: From DDoS (Distributed Denial of Service) To EDoS (Economic Denial of Sustainability). Blog (2008). Accessed 27 November 2008Google Scholar
  9. 9.
    Swami, R., Dave, M., Ranga, V.: Software-defined networking-based DDoS defense mechanisms. ACM Comput. Surv. (CSUR) 52(2), 28 (2019)CrossRefGoogle Scholar
  10. 10.
    Chaudhary, D., Bhushan, K., Gupta, B.B.: Survey on DDoS attacks and defense mechanisms in cloud and fog computing. Int. J. E-Serv. Mobile Appl. (IJESMA) 10(3), 61–83 (2018)CrossRefGoogle Scholar
  11. 11.
    Joshi, A., Vijayan, S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: IEEE International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2012)Google Scholar
  12. 12.
    Chapade, S.S., Pandey, K.U., Bhade, D.S.: Securing cloud servers against flooding-based DDoS attacks. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 524–528 (2013)Google Scholar
  13. 13.
    Khor, S.H., Nakao, A.: sPoW: on-demand cloud-based eDDoS mitigation mechanism. In: HotDep (Fifth Workshop on Hot Topics in System Dependability) (2009)Google Scholar
  14. 14.
    Green, J., Juen, J., Fatemieh, O., Shankesi, R., Jin, D.(Kevin), Gunter, C.A.: Reconstructing hash reversal based proof of work schemes. In: LEET (2011)Google Scholar
  15. 15.
    Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield a two-steps mitigation technique against EDoS attacks in cloud computing. In: Fourth IEEE International Conference on Utility and Cloud Computing, pp. 49–56, (2011)Google Scholar
  16. 16.
    Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Fourth International Conference on Computational Intelligence and Communication Networks, pp. 535–539 (2012)Google Scholar
  17. 17.
    Masood, M., Anwar, Z., Raza, S.A., Hur, M.A.: EDoS Armor: a cost-effective economic denial of sustainability attack mitigation framework for E-commerce applications in cloud environments. In: 16th IEEE International Multi Topic Conference (INMIC), pp. 37–42 (2013)Google Scholar
  18. 18.
    Chowdhury, F.Z., Idris, M.Y.I., Kiah, M.L.M., Ahsan, M.M.: EDoS eye: a game theoretic approach to mitigate economic denial of sustainability attack in cloud computing. In: 8th IEEE Control and System Graduate Research Colloquium (ICSGRC), pp. 164–169 (2017)Google Scholar
  19. 19.
    Shawahna, A., Abu-Amara, M., Mahmoud, A., Osais, Y.E.: EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans. Cloud Comput. (1), 1 (2018)Google Scholar
  20. 20.
    Bawa, P.S., Rehman, S.U., Manickam, S.: Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments. Int. J. Adv. Comput. Sci. Appl. 8(9), 51–58 (2017)Google Scholar
  21. 21.
    Sengar, H., Wang, H., Wijesekera, D., Jajodia, S.: Detecting VoIP floods using the Hellinger distance. IEEE Trans. Parallel Distrib. Syst. 19(6), 794–805 (2008)CrossRefGoogle Scholar
  22. 22.
    Shannon, C.E.: A note on the concept of entropy. Bell Syst. Tech. 27(1), 379–423 (1948)CrossRefGoogle Scholar
  23. 23.
    Shalimov, A., Zuikov, D., Zimarina, D., Pashkov, V., Smeliansky, R.: Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th Central & Eastern European Software Engineering Conference, Russia, p. 1, ACM (2013)Google Scholar
  24. 24.
    De Oliveira, R.L.S., Schweitzer, C.M., Shinoda, A.A., Prete, L.R.: Using mininet for emulation and prototyping software-defined networks. In: IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1–6 (2014)Google Scholar
  25. 25.
    Baig, Z.A., Sait, S.M., Binbeshr, F.: Controlled access to cloud resources for mitigating economic denial of sustainability (EdoS) attacks. Comput. Netw. 97(1), 31–47 (2016)CrossRefGoogle Scholar
  26. 26.
    Hulboj, M.M., Jurga, R.E.: Packet Sampling and Network Monitoring (2007)Google Scholar
  27. 27.
    ARBOR Networks: Worldwide Infrastructure Security Report XI (2016). https://www.arbornetworks.com/images/documents/WISR2016_EN_Web

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Parminder Singh
    • 1
  • Shafiq Ul Rehman
    • 2
    Email author
  • Selvakumar Manickam
    • 1
  1. 1.National Advanced IPv6 Centre (Nav6)Universiti Sains Malaysia (USM)George TownMalaysia
  2. 2.ST Engineering Electronics - SUTD Cyber Security LaboratorySingapore University of Technology and Design (SUTD)SingaporeSingapore

Personalised recommendations