A SURVEY of MITIGATION TECHNIQUES AGAINST ECONOMIC DENIAL of SUSTAINABILITY (EDOS) ATTACK on CLOUD COMPUTING ARCHITECTURE

被引:0
作者
Singh, Parminder [1 ]
Manickam, Selvakumar [1 ]
Rehman, Shafiq Ul [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv Ctr NAv6 IPv6, George Town, Malaysia
来源
2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS) | 2014年
关键词
EDoS; Cloud Computing; Security; Survey; DDoS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the next revolution in the Information and Communication Technology arena. It is a model in which computing is delivered as a commoditized service similar to electricity, water and telecommunication. Cloud computing provides software, platform, infrastructure and other hybrid models which are delivered as subscription-based services in which customers pay based on usage. Nevertheless, security is one of the main factors that inhibit the proliferation of cloud computing. Economic Denial of Sustainability (EDoS) is a new breed of security and economical threats to the cloud computing. Unlike the traditional Distributed Denial of Service (DDoS) which brings down a particular service by exhausting the resources of the server in traditional setup, EDoS takes advantage of the elasticity of the cloud service. This causes the resources to dynamically scale to meet the demand (as a result of EDoS attack) resulting in a hefty bill for the customer. In this survey, we review various EDoS mitigation techniques that have been introduced in recent years.
引用
收藏
页数:4
相关论文
共 13 条
[1]  
[Anonymous], 2010, 33 INT CONVENTION MI
[2]   Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks [J].
Chonka, Ashley ;
Xiang, Yang ;
Zhou, Wanlei ;
Bonti, Alessio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1097-1107
[3]  
CloudWatch A., 2013, MON AWS CLOUD RES
[4]  
Fang L, 2011, NIST CLOUD COMPUTING
[5]   Understanding Cloud Computing Vulnerabilities [J].
Grobauer, Bernd ;
Walloschek, Tobias ;
Stoecker, Elmar .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :50-57
[6]  
Khor S.H., 2009, SPOW ON DEMAND CLOUD
[7]  
Kumar M.N., 2012, COMP INT COMM NETW C
[8]  
Liu W., 2009, INT INF TECHN APPL 2
[9]  
Masood M., 2013, COST EFFECTIVE EC DE
[10]  
Metz C, 2009, REGISTER