Economic Denial of Sustainability Mitigation in Cloud Computing

Conference paper
Part of the Lecture Notes in Information Systems and Organisation book series (LNISO, volume 13)

Abstract

Cloud Computing is a large-set of resources and services offered through the Internet according to a on-demand self service model. In particular, the cloud elasticity allows customers to scale-up their applications in order to provide services to a larger number of end-users. The provided services are charged based on a pay-per-use business model. According to such a model, Distributed Denial of Service attacks can be transformed in a new breed of attacks, which target the cloud flexibility, in order to inflict fraudulent resource consumptions. In this paper, we proposed an approach to mitigate such new kind of threats in Cloud Computing, which have direct effects on the customer costs and not only on the service performance perceived by end-users.

Keywords

Cloud security Service level agreement Economic denial of sustainability Intrusion prevention Attack mitigation 

Notes

Acknowledgments

This research is partially supported by the European Community’s Seventh Framework Programme (FP7/2007-2013) under Grant Agreements no. 610795 (SPECS), as well as the MIUR under Projects “DISPLAY” (PON02_00485_3487784) and “MINIMINDS” (PON02_00485_3164061) of the public private laboratory “COSMIC” (PON02_00669).

References

  1. 1.
    Ficco, M., Tasquier, L., Di Martino, B.: Interconnection of federated clouds. In: Intelligent Distributed Computing VII, Studies in Computational Intelligence, 2014, vol. 511, pp. 243–248Google Scholar
  2. 2.
    Francois, J., Aib, I., Boutaba, R.: Firecol, a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking 20(6), 1828–1841 (2012)CrossRefGoogle Scholar
  3. 3.
    Baig, Z.A., Binbeshr, F.: Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures. In: Proceedings of the International Conference on Cloud Computing and Big Data, Dec 2013, pp. 346–353Google Scholar
  4. 4.
    Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, 2012, pp. 535–539Google Scholar
  5. 5.
    Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 13(4), 737–751 (2014)Google Scholar
  6. 6.
    HinKhor, S., Nakao, A.: sPoW: On-demand cloud-based eDDoS mitigation mechanism. In: Proceedings of the 5th Workshop on Hot Topics in System Dependability, 2009, pp. 1–6Google Scholar
  7. 7.
    Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield—a two-steps mitigation technique against EDoS attacks in cloud computing. In: Proceedings of the 4th IEEE International Conference on Utility and Cloud Computing, 2011, pp. 49–56Google Scholar
  8. 8.
    Beitollahi, H., Deconinck, G.: Fosel: Filtering by helping an overlay secure layer to mitigate dos attacks. In: Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA), July 2008, pp. 19–28Google Scholar
  9. 9.
    Ping, D., Nakao, A.: DDoS defense as a network service. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Apr 2010, pp. 894–897Google Scholar
  10. 10.
    Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Int. J. Netw. Comput. Appl. 34, 1097–1107 (2011)CrossRefGoogle Scholar
  11. 11.
    Amazon CloudWatch, Amazon Website, available at http://aws.amazon.com/cloudwatch/, May 2014
  12. 12.
    Yu, S., Tian, Y., Guo, S., Oliver Wu, D.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254Google Scholar
  13. 13.
    Ficco, M., Rak, M.: Intrusion tolerant approach for denial of service attacks to web services. In: Proceedings of the 1st International Conference on Data Compression, Communications and Processing (CCP), June 2011, pp. 285–292Google Scholar
  14. 14.
    Ficco, M., Rak, M.: Intrusion tolerance as a service: a SLA-based solution. In: Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER), Apr 2012, pp. 375–384Google Scholar
  15. 15.
    Ficco, M., Rak, M.: Intrusion tolerance of stealth DoS attacks to web services. In: Information Security and Privacy, LNCS, vol. 376, pp. 579–584, 2012Google Scholar
  16. 16.
    AlEroud, A., Karabatis, G.: Toward zero-day attack identification using linear data transformation techniques. In: Proceedings of the IEEE 7th International Conference on Software Security and Reliability (SERE), 2013, pp. 159–168Google Scholar
  17. 17.
    Amato, A., Venticinque, S.: Multi-objective decision support for brokering of cloud SLA. In: Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013, pp. 1241–1246Google Scholar
  18. 18.
    Ficco, M., Rak, M., Di Martino, B.: An intrusion detection framework for supporting SLA assessment in cloud computing. In: 4th International Conference on Computational Aspects of Social Networks (CASoN 2012), Sao Carlos, Brazil, Nov 2012, pp. 244–249Google Scholar
  19. 19.
    Ficco, M.: Security event correlation approach for cloud computing. J. High Perform. Comput. Networking 7(3), 173–185 (2013)CrossRefGoogle Scholar
  20. 20.
    Joshi, B., Vijayan, A.S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), 2012, pp. 1–5Google Scholar
  21. 21.
    Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security, LNCS, vol. 7722, no. 2013, pp. 10–21Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of Industrial and Information EngineeringSecond University of Naples (SUN)AversaItaly

Personalised recommendations