Abstract

Cloud computing (CC) is the next revolution in the Information and Communication Technology arena. CC is often provided as a service comparable to utility services such as electricity, water, and telecommunications. Cloud service providers (CSP) offers tailored CC services which are delivered as subscription-based services, in which customers pay based on the usage. Many organizations and service providers have started shifting from traditional server-cluster infrastructure to cloud-based infrastructure. Nevertheless, security is one of the main factors that inhibit the proliferation of cloud computing. The threat of Distributed Denial of Service (DDoS) attack continues to wreak havoc in these cloud infrastructures. In addition to DDoS attacks, a new form of attack known as Economic Denial of Sustainability (EDoS) attack has emerged in recent years. DDoS attack in conventional computing setup usually disrupts the service, which affects the client reputation, and results in financial loss. In CC environment, service disruption is very rare due to the auto-scalability (Elasticity), capability, and availability of service level agreements (SLA). However, auto scalability utilize more computing resources in event of a DDoS attack, exceeding the economic bounds for service delivery, thereby triggering EDoS for the organization targeted. Although EDoS attacks are small at the moment, it is expected to grow in the near future in tandem with the growth in cloud usage. There are few EDoS detection and mitigation techniques available but they have weaknesses and are not efficient in mitigating EDoS. Hence, an enhanced EDoS mitigation mechanism (EDoS-EMM) has been proposed. The aim of this mechanism is to provide a real-time detection and effective mitigation of EDoS attack.

Highlights

  • Internet has become an integral part of our everyday routine

  • Cloud computing (CC) solutions are usually offered by Cloud Service providers (CSP) by providing customizable cloud service models such as Infrastructure-as-a-Service, Platformas-a-Service, and Software-as-a-Service [4]

  • The new issue is about the high cost that needs to be paid by the client/user of the CC platform due to extra resources allocated due to resource saturation caused by the Distributed Denial of Service (DDoS) attack [9], [10]

Read more

Summary

INTRODUCTION

Internet has become an integral part of our everyday routine. Technology has evolved rapidly especially around the field of Information and Communication Technology (ICT) whereby new platforms are being continuously introduced; leading to newer opportunities and challenges [1], [2]. Cloud computing (CC) is one of the latest revolution in ICT [3] It is a model in which computing is delivered as any other commoditized service like electricity, water, and telecommunication. Cloud service providers tend to implement their own copyrighted standards and security technologies, and deploy divergent security models. Such tendencies call for qualities of each technology and system to be assessed individually. The new issue is about the high cost that needs to be paid by the client/user of the CC platform due to extra resources allocated due to resource saturation caused by the DDoS attack [9], [10]. Afterwards, the details of the proposed mechanism are described in details to mitigate it effectively

RELATED WORKS
EDoS-Shield
Scrubber Service
EDoS Armor
PROPOSED MECHANISM
Detection Module
Mitigation Module
CONCLUSION AND FUTURE WORK

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.