Skip to main content
Top
Published in: Cluster Computing 3/2021

07-03-2021

Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach

Authors: K. C. Lalropuia, Vandana Khaitan (nee Gupta)

Published in: Cluster Computing | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Economic denial of sustainability (EDoS) attack is a new type of distributed denial of service (DDoS) attack which targets the economic resources of cloud adopters by exploiting the auto-scaling features of the cloud. EDoS attack has become a significant threat to cloud adopters as it can lead to bankruptcy or withdrawal from cloud services and this in turn entails unavailability of the cloud services. In fact, availability has been one of the most significant issues of cloud computing securities. To address this issue caused by an EDoS attack, we develop a novel state-based availability model of the cloud under the EDoS attack with the help of a semi-Markov process. Based on the proposed model, we determine the steady state availability of the cloud under the EDoS attack. In addition, we derive the mean time to failure (or reliability) of the cloud in the presence of the EDoS attack to characterize the period of time for which the cloud adopter experiences the state of being bankrupt or service unsustainable situation. Moreover, we present a cost management strategy to prevent the cloud adopter from undergoing bankruptcy or experiencing unexpected exorbitant bill by incorporating the cloud shutdown feature into the proposed model. Numerical illustrations are presented which give insights into how availability and reliability of the cloud services are affected by the EDoS attack. The proposed model is also validated via simulation evidences.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Heimovski, G.B., Turchetti, R.C., Wickboldt, J.A., Granville, L.Z., Duarte, E.P., Jr.: FT-Aurora: A highly available IaaS cloud manager based on replication. Comput. Netw. 168, (2020) Heimovski, G.B., Turchetti, R.C., Wickboldt, J.A., Granville, L.Z., Duarte, E.P., Jr.: FT-Aurora: A highly available IaaS cloud manager based on replication. Comput. Netw. 168, (2020)
2.
go back to reference Liu, B., Chang, X., Han, Z., Trivedi, K.S., Rodriguez, R.J.: Model-based sensitivity analysis of IaaS cloud availability. Future Gener. Comput. Syst. 83, 1–13 (2018)CrossRef Liu, B., Chang, X., Han, Z., Trivedi, K.S., Rodriguez, R.J.: Model-based sensitivity analysis of IaaS cloud availability. Future Gener. Comput. Syst. 83, 1–13 (2018)CrossRef
3.
go back to reference Al-Haidari, F., Sqalli, M., Salah, K.: Evaluation of the impact of EDoS attacks against cloud computing services. Arab. J. Sci. Eng. 40, 773–785 (2015)CrossRef Al-Haidari, F., Sqalli, M., Salah, K.: Evaluation of the impact of EDoS attacks against cloud computing services. Arab. J. Sci. Eng. 40, 773–785 (2015)CrossRef
4.
go back to reference Baig, Z.A., Sait, S.M., Binbeshr, F.: Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Comput. Netw. 97, 31–47 (2016)CrossRef Baig, Z.A., Sait, S.M., Binbeshr, F.: Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Comput. Netw. 97, 31–47 (2016)CrossRef
5.
go back to reference Zhang, Q., Cheng, L., Boutaba, R.: Cloud Computing: State of the art and research challenges. J. Internet Serv. Appl. 1, 7–18 (2010)CrossRef Zhang, Q., Cheng, L., Boutaba, R.: Cloud Computing: State of the art and research challenges. J. Internet Serv. Appl. 1, 7–18 (2010)CrossRef
6.
go back to reference Al-Roomi, M., Al-Ebrahim, S., Buqrais, S., Ahmad, I.: Cloud computing pricing models: a survey. Int. J. Grid Distrib. Comput. 6(5), 93–106 (2013)CrossRef Al-Roomi, M., Al-Ebrahim, S., Buqrais, S., Ahmad, I.: Cloud computing pricing models: a survey. Int. J. Grid Distrib. Comput. 6(5), 93–106 (2013)CrossRef
7.
go back to reference Shawahna, A., Abu-Amara, M., Mahmoud, A.S.H., Osais, Y.: EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans. Cloud Comput. 8(3), 790–804 (2018) Shawahna, A., Abu-Amara, M., Mahmoud, A.S.H., Osais, Y.: EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans. Cloud Comput. 8(3), 790–804 (2018)
8.
go back to reference Wang, H., Xi, Z., Li, F., Chen, S.: Abusing public third-party services for edos-attacks, 10th USENIX Workshop on Offensive Technologies (WOOT 16), USENIX Association (2016) Wang, H., Xi, Z., Li, F., Chen, S.: Abusing public third-party services for edos-attacks, 10th USENIX Workshop on Offensive Technologies (WOOT 16), USENIX Association (2016)
9.
go back to reference Prasad, K.M., Reddy, A.R.M., Rao, K.V.: DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment. Clust. Comput. 21, 1765–1783 (2018)CrossRef Prasad, K.M., Reddy, A.R.M., Rao, K.V.: DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment. Clust. Comput. 21, 1765–1783 (2018)CrossRef
10.
go back to reference https://en.greatfire.org/blog/2015/mar/we-are-under-attack https://en.greatfire.org/blog/2015/mar/we-are-under-attack
11.
go back to reference Wang, L., Yang, Z., Song, X.: SHAMC: a secure and highly available database system in multi-cloud environment. Future Gener. Comput. Syst. 105, 873–883 (2020)CrossRef Wang, L., Yang, Z., Song, X.: SHAMC: a secure and highly available database system in multi-cloud environment. Future Gener. Comput. Syst. 105, 873–883 (2020)CrossRef
12.
go back to reference Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22, S13027–S13039 (2019)CrossRef Balamurugan, V., Saravanan, R.: Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Clust. Comput. 22, S13027–S13039 (2019)CrossRef
13.
go back to reference Ficco, M.: Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? Inf. Sci. 476, 474–490 (2019)CrossRef Ficco, M.: Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? Inf. Sci. 476, 474–490 (2019)CrossRef
14.
go back to reference Endo, P.T., Rodrigues, M., Goncalves, G.E., Kelner, J., Sadok, D.H.: High availability in clouds: systematic review and research challenges. J. Cloud Comput. 5(16), (2016) Endo, P.T., Rodrigues, M., Goncalves, G.E., Kelner, J., Sadok, D.H.: High availability in clouds: systematic review and research challenges. J. Cloud Comput. 5(16), (2016)
15.
go back to reference Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., Basu, K., Chaudhury, S., Sarkar, P.: Cloud Computing Security Challenges & Solutions—A Survey. IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)(2018) Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., Basu, K., Chaudhury, S., Sarkar, P.: Cloud Computing Security Challenges & Solutions—A Survey. IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)(2018)
16.
go back to reference Nabi, M., Toeroe, M., Khendek, F.: Availability in the cloud: state of the art. J. Netw. Comput. Appl.60, 54–67 (2016)CrossRef Nabi, M., Toeroe, M., Khendek, F.: Availability in the cloud: state of the art. J. Netw. Comput. Appl.60, 54–67 (2016)CrossRef
17.
go back to reference Zhang, Q., Li, S., Li, Z., Xing, Y., Yang, Z., Dai, Y.: CHARM: a cost-efficient multi-cloud data hosting scheme with high availability. IEEE Trans. Cloud Comput. 3(3), 372–386 (2015)CrossRef Zhang, Q., Li, S., Li, Z., Xing, Y., Yang, Z., Dai, Y.: CHARM: a cost-efficient multi-cloud data hosting scheme with high availability. IEEE Trans. Cloud Comput. 3(3), 372–386 (2015)CrossRef
18.
go back to reference Nguyen, T.A., Min, D., Choi, E., Thang, T.D.: Reliability and availability evaluation for cloud data center networks using hierarchical models. IEEE Access 7, 9273–9313 (2019)CrossRef Nguyen, T.A., Min, D., Choi, E., Thang, T.D.: Reliability and availability evaluation for cloud data center networks using hierarchical models. IEEE Access 7, 9273–9313 (2019)CrossRef
19.
go back to reference Dantas, J., Matos, R., Araujo, J., Maciel, P.: Eucalyptus-based private clouds: availability modeling and comparison to the cost of a public, Cloud Comput. 97, 1121–1140 (2015)MathSciNetMATH Dantas, J., Matos, R., Araujo, J., Maciel, P.: Eucalyptus-based private clouds: availability modeling and comparison to the cost of a public, Cloud Comput. 97, 1121–1140 (2015)MathSciNetMATH
20.
go back to reference Ataie, E., Entezari-Maleki, R., Rashida, L., Trivedi, K.S., Ardagna, D., Movaghar, A.: Hierarchical stochastic models for performance, availability, and power consumption analysis of IaaS clouds. IEEE Trans. Cloud Comput. 7(4), 1039–1056 (2019)CrossRef Ataie, E., Entezari-Maleki, R., Rashida, L., Trivedi, K.S., Ardagna, D., Movaghar, A.: Hierarchical stochastic models for performance, availability, and power consumption analysis of IaaS clouds. IEEE Trans. Cloud Comput. 7(4), 1039–1056 (2019)CrossRef
21.
go back to reference Matos, R., Dantas, J., Araujo, J., Trivedi, K.S., Maciel, P.: Redundant eucalyptus private clouds: availability modeling and sensitivity analysis. J. Grid Comput. 15, 1–22 (2017)CrossRef Matos, R., Dantas, J., Araujo, J., Trivedi, K.S., Maciel, P.: Redundant eucalyptus private clouds: availability modeling and sensitivity analysis. J. Grid Comput. 15, 1–22 (2017)CrossRef
22.
go back to reference Thananakornworakij, T., Nassar, R.F., Leangsuksun, C., Paun, M.: A reliability model for cloud computing for high performance computing applications. Euro-Par’12: Proceedings of the 18th International Conference on Parallel processing workshops, pp. 474–483 (2012) Thananakornworakij, T., Nassar, R.F., Leangsuksun, C., Paun, M.: A reliability model for cloud computing for high performance computing applications. Euro-Par’12: Proceedings of the 18th International Conference on Parallel processing workshops, pp. 474–483 (2012)
23.
go back to reference Li, R., Li, Q., Huang, N.: A simplified reliability analysis method for cloud computing systems considering common-cause failures. Proc. Institut. Mech. Eng. Part O 231(3), 324–333 (2017) Li, R., Li, Q., Huang, N.: A simplified reliability analysis method for cloud computing systems considering common-cause failures. Proc. Institut. Mech. Eng. Part O 231(3), 324–333 (2017)
24.
go back to reference Kavin, B.P., Ganapathy, S.: A secure storage and privacy preserving model using CRT for providing security on cloud and IoT-based applications. Comput. Netw. 151, 181–190 (2019)CrossRef Kavin, B.P., Ganapathy, S.: A secure storage and privacy preserving model using CRT for providing security on cloud and IoT-based applications. Comput. Netw. 151, 181–190 (2019)CrossRef
25.
go back to reference Kavin, B.P., Ganapathy, S., Kanimozhi, U., Kannan, A.: An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA. Wirel. Personal Commun. 115, 1107–1135 (2020)CrossRef Kavin, B.P., Ganapathy, S., Kanimozhi, U., Kannan, A.: An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA. Wirel. Personal Commun. 115, 1107–1135 (2020)CrossRef
26.
go back to reference Ganapathy, S., Vijayalakhsmi, M., Kannan, A.: An effective intrusion detection on cloud virtual machines using hybrid feature selection and multiclass classifier. Austral. J. Basic Appl. Sci. 9, 38–41 (2015) Ganapathy, S., Vijayalakhsmi, M., Kannan, A.: An effective intrusion detection on cloud virtual machines using hybrid feature selection and multiclass classifier. Austral. J. Basic Appl. Sci. 9, 38–41 (2015)
27.
go back to reference Ganapathy, S., Vijayakumar, P., Yogesh, P., Kannan, A.: An intelligent CRF based feature selection for effective intrusion detection. Int. Arab. J. Inf. Technol. (IAJIT) 13(1), 44–45 (2016) Ganapathy, S., Vijayakumar, P., Yogesh, P., Kannan, A.: An intelligent CRF based feature selection for effective intrusion detection. Int. Arab. J. Inf. Technol. (IAJIT) 13(1), 44–45 (2016)
28.
go back to reference Yang, C.: Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Clust. Comput. 22, S8309–S8317 (2019)CrossRef Yang, C.: Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Clust. Comput. 22, S8309–S8317 (2019)CrossRef
29.
go back to reference Saxena, R., Dey, S.: DDoS attack prevention using collaborative approach for cloud computing. Clust. Comput. 23, 1329–1344 (2020)CrossRef Saxena, R., Dey, S.: DDoS attack prevention using collaborative approach for cloud computing. Clust. Comput. 23, 1329–1344 (2020)CrossRef
30.
go back to reference Jaber, A.N., Rehman, S.U.: FCM-SVM based intrusion detection system for cloud computing environment. Clust. Comput. 23, 3221–3231 (2020)CrossRef Jaber, A.N., Rehman, S.U.: FCM-SVM based intrusion detection system for cloud computing environment. Clust. Comput. 23, 3221–3231 (2020)CrossRef
31.
go back to reference Monge, M.A.S., Vidal, J.M., Perez, G.M.: Detection of economin denial of sustainability (EDoS) threats in self-organizing networks. Comput. Commun. 145, 284–308 (2019)CrossRef Monge, M.A.S., Vidal, J.M., Perez, G.M.: Detection of economin denial of sustainability (EDoS) threats in self-organizing networks. Comput. Commun. 145, 284–308 (2019)CrossRef
32.
go back to reference Dinh, P.T., Park, M.: Dynamic Economic-Denial-of-Sustainability (EDoS) Detection in SDN-based Cloud. Presented at the (2020) Dinh, P.T., Park, M.: Dynamic Economic-Denial-of-Sustainability (EDoS) Detection in SDN-based Cloud. Presented at the (2020)
33.
go back to reference Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubinstein, D.: Using graphic turing tests to counter automated ddos attacks against web servers. Proceedings of the 10th ACM conference on Computer and communications security, ACM, 8 - 19 (2003) Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubinstein, D.: Using graphic turing tests to counter automated ddos attacks against web servers. Proceedings of the 10th ACM conference on Computer and communications security, ACM, 8 - 19 (2003)
34.
go back to reference Bhargrava, K., Brewer, D., Li, K.: A study of URL redirection indicating spam, CEAS 2009—Sixth conference on Email and Anti-Spam (2009) Bhargrava, K., Brewer, D., Li, K.: A study of URL redirection indicating spam, CEAS 2009—Sixth conference on Email and Anti-Spam (2009)
35.
go back to reference Fielding, R., Reschke, J.: Hypertext transfer protocol (http/1.1): Semantics and contents (2014) Fielding, R., Reschke, J.: Hypertext transfer protocol (http/1.1): Semantics and contents (2014)
36.
go back to reference Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: recaptcha: human-based character recognition via web security measures. Science 321(5895), 1465–1468 (2008)MathSciNetCrossRef Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: recaptcha: human-based character recognition via web security measures. Science 321(5895), 1465–1468 (2008)MathSciNetCrossRef
37.
go back to reference Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)CrossRef Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)CrossRef
41.
go back to reference Rausand, M., Hoyland, A.: System Reliability Theory: Models, Statistical Methods and Applications, 2nd edn. Wiley, New York (2004)MATH Rausand, M., Hoyland, A.: System Reliability Theory: Models, Statistical Methods and Applications, 2nd edn. Wiley, New York (2004)MATH
42.
go back to reference Xie, W., Hong, Y., Trivedi, K.S.: Analysis of a two-level software rejuvenation policy. Reliab. Eng. Syst. Saf. 87(1), 13–22 (2005)CrossRef Xie, W., Hong, Y., Trivedi, K.S.: Analysis of a two-level software rejuvenation policy. Reliab. Eng. Syst. Saf. 87(1), 13–22 (2005)CrossRef
43.
go back to reference Lisnianski, A., Frenkel, I., Ding, Y.: Multi-state System Reliability Analysis and Optimization for Engineers and Industrial Managers. Springer-Verlag, London (2010)CrossRef Lisnianski, A., Frenkel, I., Ding, Y.: Multi-state System Reliability Analysis and Optimization for Engineers and Industrial Managers. Springer-Verlag, London (2010)CrossRef
44.
go back to reference Trivedi, K.S.: Probability & Statistics with reliability, queuing and computer science applications, 2nd edn. Wiley, New York (2001) Trivedi, K.S.: Probability & Statistics with reliability, queuing and computer science applications, 2nd edn. Wiley, New York (2001)
Metadata
Title
Availability and reliability analysis of cloud computing under economic denial of sustainability (EDoS) attack: a semi-Markov approach
Authors
K. C. Lalropuia
Vandana Khaitan (nee Gupta)
Publication date
07-03-2021
Publisher
Springer US
Published in
Cluster Computing / Issue 3/2021
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03257-9

Other articles of this Issue 3/2021

Cluster Computing 3/2021 Go to the issue

Premium Partner