Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks

被引:33
作者
Baig, Zubair A. [1 ,2 ]
Sait, Sadiq M. [3 ]
Binbeshr, Farid [3 ]
机构
[1] Edith Cowan Univ, Sch Sci, Perth, WA, Australia
[2] Edith Cowan Univ, Secur Res Inst, Perth, WA, Australia
[3] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, EP, Saudi Arabia
关键词
Economic Denial of Sustainability attacks (EDoS); Cloud computing; Network security; Rate control;
D O I
10.1016/j.comnet.2016.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a paradigm that provides scalable IT resources as a service over the Internet. Vulnerabilities in the cloud infrastructure have been readily exploited by the adversary class. Therefore, providing the desired level of assurance to all stakeholders through safeguarding data (sensitive or otherwise) which is stored in the cloud, is of utmost importance. In addition, protecting the cloud from adversarial attacks of diverse types and intents, cannot be understated. Economic Denial of Sustainability (EDoS) attack is considered as one of the concerns that has stalled many organizations from migrating their operations and/or data to the cloud. This is because an EDoS attack targets the financial component of the service provider. In this work, we propose a novel and reactive approach based on a rate limit technique, with low overhead, to detect and mitigate EDoS attacks against cloud-based services. Through this reactive scheme, a limited access permission for cloud services is granted to each user. Experiments were conducted in a laboratory cloud setup, to evaluate the performance of the proposed mitigation technique. Results obtained show that the proposed approach is able to detect and prevent such an attack with low cost and overhead. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:31 / 47
页数:17
相关论文
共 26 条
[1]  
Al-Haidari F., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1167, DOI 10.1109/TrustCom.2012.146
[2]  
Alosaimi W., 2013, Proceedings of the 14th Annual Post Graduates Symposium on the convergence of Telecommunication, Networking and Broadcasting (PGNet), P116
[3]  
[Anonymous], 2012, UNDERSTANDING HETERO
[4]  
[Anonymous], 2012, P 4 INT C COMP INT C
[5]   Context-aware Job Scheduling for Cloud Computing Environments [J].
Assuncao, Marcos D. ;
Netto, Marco A. S. ;
Koch, Fernando ;
Bianchi, Silvia .
2012 IEEE/ACM FIFTH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2012), 2012, :255-262
[6]  
Bellenger Dominique, 2011, Recent Researches in Computer Science. Proceedings ot the 15th WSEAS International Conference on Computers (Part of the 15th WSEAS CSCC Multiconference), P145
[7]   Securing Cloud Servers against Flooding Based DDOS Attacks [J].
Chopade, S. S. ;
Pandey, K. U. ;
Bhade, D. S. .
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, :524-528
[8]  
Dutta K., 2012, Proceedings of the 2012 1st International Conference on Recent Advances in Information Technology (RAIT 2012), P346, DOI 10.1109/RAIT.2012.6194444
[9]  
Gligor V.D., 2003, PROC INTLWORKSHOP SE, P80
[10]  
Hoff C., 2008, CLOUD COMPUTING SECU