Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing

被引:28
作者
Bhushan, Kriti [1 ]
Gupta, Brij B. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Fraudulent Resource Consumption (FRC) attacks; Network flow analysis; Low rate DDoS attacks; Cloud security; Cloud pricing model; Turing test; EDoS attack; Multimedia cloud; FRAMEWORK;
D O I
10.1007/s11042-017-5522-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multimedia computing has evolved as a remarkable technology which provides services to view, create, edit, process, and search multimedia contents. All these multimedia services have high computational, bandwidth, and storage requirements. Therefore, multimedia cloud computing has gained appreciable popularity and acceptance in the past one decade. The convenience of cloud computing comes with financial burden. One of the fundamental features of cloud computing, which helps in reducing the financial worries of the multimedia service providers is the cloud's pay-as-you-go pricing model. However, the cloud's pricing model has also attracted adversaries that have hindered the migration of services and/or data by various organisations to the cloud. Through the cloud's pay-as-you-go pricing model, attackers usually target the financial viability of the cloud customers. Therefore, such attacks are capable to affect the long term availability of multimedia-services hosted on the public cloud. These attacks are known as Fraudulent Resource Consumption (FRC) attack. Therefore, research in the area of FRC attack detection and mitigation is important in motivating the organisations to adopt the public cloud platform. In this paper, we propose a novel approach based on network flow analysis at the victim side to detect and mitigate the FRC attacks against cloud-based services. Experiments were conducted using real world benchmark datasets to evaluate the performance of the proposed approach. Experimental outcomes suggest that our proposed approach is able to detect and mitigate the FRC attacks with satisfactory accuracy and low overhead.
引用
收藏
页码:4267 / 4298
页数:32
相关论文
共 46 条
[1]  
Al-Haidari F., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1167, DOI 10.1109/TrustCom.2012.146
[2]  
[Anonymous], SP NIST
[3]   Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security [J].
Atat, Rachad ;
Liu, Lingjia ;
Chen, Hao ;
Wu, Jinsong ;
Li, Hongxiang ;
Yi, Yang .
IET Cyber-Physical Systems: Theory and Applications, 2017, 2 (01) :49-54
[4]   Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks [J].
Baig, Zubair A. ;
Sait, Sadiq M. ;
Binbeshr, Farid .
COMPUTER NETWORKS, 2016, 97 :31-47
[5]   A novel approach to defend multimedia flash crowd in cloud environment [J].
Bhushan, Kriti ;
Gupta, B. B. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (04) :4609-4639
[6]   An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
PATTERN RECOGNITION LETTERS, 2015, 51 :1-7
[7]  
Buyya R., 2010, Cloud Computing principles and paradigms
[8]   Semisupervised Feature Analysis by Mining Correlations Among Multiple Tasks [J].
Chang, Xiaojun ;
Yang, Yi .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (10) :2294-2305
[9]   Feature Interaction Augmented Sparse Learning for Fast Kinect Motion Detection [J].
Chang, Xiaojun ;
Ma, Zhigang ;
Lin, Ming ;
Yang, Yi ;
Hauptmann, Alexander G. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (08) :3911-3920
[10]   Bi-Level Semantic Representation Analysis for Multimedia Event Detection [J].
Chang, Xiaojun ;
Ma, Zhigang ;
Yang, Yi ;
Zeng, Zhiqiang ;
Hauptmann, Alexander G. .
IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (05) :1180-1197