Skip to main content

2016 | OriginalPaper | Buchkapitel

Economic Denial of Sustainability Mitigation in Cloud Computing

verfasst von : Massimo Ficco, Massimiliano Rak

Erschienen in: Organizational Innovation and Change

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud Computing is a large-set of resources and services offered through the Internet according to a on-demand self service model. In particular, the cloud elasticity allows customers to scale-up their applications in order to provide services to a larger number of end-users. The provided services are charged based on a pay-per-use business model. According to such a model, Distributed Denial of Service attacks can be transformed in a new breed of attacks, which target the cloud flexibility, in order to inflict fraudulent resource consumptions. In this paper, we proposed an approach to mitigate such new kind of threats in Cloud Computing, which have direct effects on the customer costs and not only on the service performance perceived by end-users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ficco, M., Tasquier, L., Di Martino, B.: Interconnection of federated clouds. In: Intelligent Distributed Computing VII, Studies in Computational Intelligence, 2014, vol. 511, pp. 243–248 Ficco, M., Tasquier, L., Di Martino, B.: Interconnection of federated clouds. In: Intelligent Distributed Computing VII, Studies in Computational Intelligence, 2014, vol. 511, pp. 243–248
2.
Zurück zum Zitat Francois, J., Aib, I., Boutaba, R.: Firecol, a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking 20(6), 1828–1841 (2012)CrossRef Francois, J., Aib, I., Boutaba, R.: Firecol, a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking 20(6), 1828–1841 (2012)CrossRef
3.
Zurück zum Zitat Baig, Z.A., Binbeshr, F.: Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures. In: Proceedings of the International Conference on Cloud Computing and Big Data, Dec 2013, pp. 346–353 Baig, Z.A., Binbeshr, F.: Controlled virtual resource access to mitigate economic denial of sustainability (EDoS) attacks against cloud infrastructures. In: Proceedings of the International Conference on Cloud Computing and Big Data, Dec 2013, pp. 346–353
4.
Zurück zum Zitat Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, 2012, pp. 535–539 Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, 2012, pp. 535–539
5.
Zurück zum Zitat Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 13(4), 737–751 (2014) Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 13(4), 737–751 (2014)
6.
Zurück zum Zitat HinKhor, S., Nakao, A.: sPoW: On-demand cloud-based eDDoS mitigation mechanism. In: Proceedings of the 5th Workshop on Hot Topics in System Dependability, 2009, pp. 1–6 HinKhor, S., Nakao, A.: sPoW: On-demand cloud-based eDDoS mitigation mechanism. In: Proceedings of the 5th Workshop on Hot Topics in System Dependability, 2009, pp. 1–6
7.
Zurück zum Zitat Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield—a two-steps mitigation technique against EDoS attacks in cloud computing. In: Proceedings of the 4th IEEE International Conference on Utility and Cloud Computing, 2011, pp. 49–56 Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield—a two-steps mitigation technique against EDoS attacks in cloud computing. In: Proceedings of the 4th IEEE International Conference on Utility and Cloud Computing, 2011, pp. 49–56
8.
Zurück zum Zitat Beitollahi, H., Deconinck, G.: Fosel: Filtering by helping an overlay secure layer to mitigate dos attacks. In: Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA), July 2008, pp. 19–28 Beitollahi, H., Deconinck, G.: Fosel: Filtering by helping an overlay secure layer to mitigate dos attacks. In: Proceedings of the 7th IEEE International Symposium on Network Computing and Applications (NCA), July 2008, pp. 19–28
9.
Zurück zum Zitat Ping, D., Nakao, A.: DDoS defense as a network service. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Apr 2010, pp. 894–897 Ping, D., Nakao, A.: DDoS defense as a network service. In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Apr 2010, pp. 894–897
10.
Zurück zum Zitat Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Int. J. Netw. Comput. Appl. 34, 1097–1107 (2011)CrossRef Chonka, A., Xiang, Y., Zhou, W., Bonti, A.: Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. Int. J. Netw. Comput. Appl. 34, 1097–1107 (2011)CrossRef
12.
Zurück zum Zitat Yu, S., Tian, Y., Guo, S., Oliver Wu, D.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 Yu, S., Tian, Y., Guo, S., Oliver Wu, D.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254
13.
Zurück zum Zitat Ficco, M., Rak, M.: Intrusion tolerant approach for denial of service attacks to web services. In: Proceedings of the 1st International Conference on Data Compression, Communications and Processing (CCP), June 2011, pp. 285–292 Ficco, M., Rak, M.: Intrusion tolerant approach for denial of service attacks to web services. In: Proceedings of the 1st International Conference on Data Compression, Communications and Processing (CCP), June 2011, pp. 285–292
14.
Zurück zum Zitat Ficco, M., Rak, M.: Intrusion tolerance as a service: a SLA-based solution. In: Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER), Apr 2012, pp. 375–384 Ficco, M., Rak, M.: Intrusion tolerance as a service: a SLA-based solution. In: Proceedings of the 2nd International Conference on Cloud Computing and Services Science (CLOSER), Apr 2012, pp. 375–384
15.
Zurück zum Zitat Ficco, M., Rak, M.: Intrusion tolerance of stealth DoS attacks to web services. In: Information Security and Privacy, LNCS, vol. 376, pp. 579–584, 2012 Ficco, M., Rak, M.: Intrusion tolerance of stealth DoS attacks to web services. In: Information Security and Privacy, LNCS, vol. 376, pp. 579–584, 2012
16.
Zurück zum Zitat AlEroud, A., Karabatis, G.: Toward zero-day attack identification using linear data transformation techniques. In: Proceedings of the IEEE 7th International Conference on Software Security and Reliability (SERE), 2013, pp. 159–168 AlEroud, A., Karabatis, G.: Toward zero-day attack identification using linear data transformation techniques. In: Proceedings of the IEEE 7th International Conference on Software Security and Reliability (SERE), 2013, pp. 159–168
17.
Zurück zum Zitat Amato, A., Venticinque, S.: Multi-objective decision support for brokering of cloud SLA. In: Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013, pp. 1241–1246 Amato, A., Venticinque, S.: Multi-objective decision support for brokering of cloud SLA. In: Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013, pp. 1241–1246
18.
Zurück zum Zitat Ficco, M., Rak, M., Di Martino, B.: An intrusion detection framework for supporting SLA assessment in cloud computing. In: 4th International Conference on Computational Aspects of Social Networks (CASoN 2012), Sao Carlos, Brazil, Nov 2012, pp. 244–249 Ficco, M., Rak, M., Di Martino, B.: An intrusion detection framework for supporting SLA assessment in cloud computing. In: 4th International Conference on Computational Aspects of Social Networks (CASoN 2012), Sao Carlos, Brazil, Nov 2012, pp. 244–249
19.
Zurück zum Zitat Ficco, M.: Security event correlation approach for cloud computing. J. High Perform. Comput. Networking 7(3), 173–185 (2013)CrossRef Ficco, M.: Security event correlation approach for cloud computing. J. High Perform. Comput. Networking 7(3), 173–185 (2013)CrossRef
20.
Zurück zum Zitat Joshi, B., Vijayan, A.S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), 2012, pp. 1–5 Joshi, B., Vijayan, A.S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), 2012, pp. 1–5
21.
Zurück zum Zitat Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security, LNCS, vol. 7722, no. 2013, pp. 10–21 Coppolino, L., D’Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: Critical Information Infrastructures Security, LNCS, vol. 7722, no. 2013, pp. 10–21
Metadaten
Titel
Economic Denial of Sustainability Mitigation in Cloud Computing
verfasst von
Massimo Ficco
Massimiliano Rak
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-22921-8_18