Open Access   Article Go Back

Multilayered Framework for Mitigating (MLFM) EDoS Attack

A. Somasundaram1

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 369-375, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.369375

Online published on Nov 30, 2018

Copyright © A. Somasundaram . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Somasundaram, “Multilayered Framework for Mitigating (MLFM) EDoS Attack,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.369-375, 2018.

MLA Style Citation: A. Somasundaram "Multilayered Framework for Mitigating (MLFM) EDoS Attack." International Journal of Computer Sciences and Engineering 6.11 (2018): 369-375.

APA Style Citation: A. Somasundaram, (2018). Multilayered Framework for Mitigating (MLFM) EDoS Attack. International Journal of Computer Sciences and Engineering, 6(11), 369-375.

BibTex Style Citation:
@article{Somasundaram_2018,
author = {A. Somasundaram},
title = {Multilayered Framework for Mitigating (MLFM) EDoS Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {369-375},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3171},
doi = {https://doi.org/10.26438/ijcse/v6i11.369375}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.369375}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3171
TI - Multilayered Framework for Mitigating (MLFM) EDoS Attack
T2 - International Journal of Computer Sciences and Engineering
AU - A. Somasundaram
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 369-375
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
559 249 downloads 277 downloads
  
  
           

Abstract

“Cloud Computing” is an attractive model for enterprise businesses because of its on-demand, openness, reduced cost, scalability and pay-by-use business model. The DDoS attack on metered resources of Cloud environment is termed as Fraudulent Resource Consumption (FRC) attack. The FRC Attack leads to EDoS (economic Distributed Denial of Service) attack which aims to consume the cloud resource by attacker and impose financial burden to the legitimate user, where integrity, availability and confidentiality of the cloud services are never compromised but affects the accountability which leads to inaccurate billing. This paper surveys different techniques that generate, detect and mitigate the EDoS Attack on Cloud and proposes a Multilayered Framework for Mitigating EDoS Attack.

Key-Words / Index Term

Cloud computing; Distributed Denial of Service (DDoS) attack; Fraudulent Resource Consumption (FRC) attack,; Economic Distributed Denial of Service (EDoS) Attack

References

[1] Antunes, J.; Neves, N.; Verissimo, P. Detection and Prediction of Resource-Exhaustion Vulnerabilities. In Proceedings of the 19th International Symposium on Software Reliability Engineering, Seattle, WA, USA, 10–14 November 2008; pp. 87–96.
[2] Akshay Narayan, Shrisha Rao, Gaurav Ranjan and Kumar Dheenadayalan,” Smart Metering of Cloud Services”, 6th Annual IEEE International Systems Conference (IEEE SysCon 2012), Vancouver, Canada, March 2012.
[3] Al-Haidari, Fahd, Mohammed H. Sqalli, and Khaled Salah. "Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses."Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012.
[4] Armin Slopek and Natalija Vlajic, ”Economic Denial of Sustainability (EDoS) Attack in the Cloud Using Web-Bugs”, in 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014), Gothenburg, Sweden , September 2014.
[5] Ashley Chonka,YangXiang n, WanleiZhou,AlessioBonti .”Cloud security to protect cloud computing against HTTP-DoS and XML-DoS attacks”. Journal of Computer Applications. Volume 34, Issue 4, July 2011, Pages 1097–1107.
[6] B Saini, G Somani , “Index Page Based EDoS Attacks in Infrastructure Cloud” , in Recent Trends in Computer Networks and Distributed Systems Security(2014), 382-395
[7] Bing Wang , Yao Zheng, Wenjing Lou, Y. Thomas Hou.DDoS attack protection in the era of cloud computing and Software-Defined Networking. Computer Networks 81 (2015) 308–319.
[8] Denial-of-service attack ,Wikipedia, http://en.wikipedia.org/wiki/Denial-of-service_attack
[9] G. Stonebumer, A. Goguen, and A. Feringa, “Risk Management Guide for Information Technology Systems,” NIST Special Publication 800-30, July 2002.
[10] http://www.rationalsurvivability.com/blog/2009/01/a-couple-of-follow-ups-on-the-edos-economic -denial-of-sustainability-concept
[11] Joseph Idziorek and Mark Tannian, “Exploiting Cloud Utility Models for Profit and Ruin”, Proceedings of IEEE International Conference on Cloud Computing, pp. 33-40, 2011.
[12] Joseph Idziorek, Mark F. Tannian, and Doug Jacobson,” The Insecurity of Cloud Utility Models”, IEEE Computer Society, March/April 2013.
[13] Keromytis, A., Misra, V., AND Rubenstein, D., 2002. SOS : Secure Overlay Services. SIGCOMM, pp. 61–72.
[14] Koduru, A. ; Comput. Sci. & Eng., Nat. Inst. of Technol., Trichy, India ; Neelakantam, T. ; Saira Bhanu, S.M. Detection of Economic Denial of Sustainability Using Time Spent on a Web Page in Cloud, IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) 2013
[15] L. Jun-Ho et.al. “Multi-level intrusion detection system and log management in cloud computing,” Proceedings of the13th International Conf. pp. 552–555, Feb. 2011
[16] Massimo Ficco and Massimiliano Rak, Stealthy Denial of Service Strategy in Cloud Computing, IEEE Transactions On Cloud Computing, January 2015.
[17] Mirkovic, G. Prier, and P. Reiher. 2002a. Attacking DDoS at the source. In Net-work Protocols, 2002. Proceedings.10th IEEE International Conference on. 312–321.DOI:http://dx.doi.org/10.1109/ICNP.2002.1181418
[18] Mohit Kumar, Nirmal Roberts.”A Technique to reduce the Economic Denial of Sustainability (EDoS) Attack in Cloud”. Fourth International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2013
[19] Mor Sides , Anat Bremler-Barr, Elisha Rosensweig in “ Yo-Yo Attack - Vulnerability in auto-scaling mechanism “ in SIGCOMM ’15 August 17-21, 2015, London, United Kingdom
[20] Naresh Kumar, M. , Sujatha, P. ; Kalva, V. ; Nagori, R. ; Katukojwala, A.K. ; Kumar, M., Mitigating Economic Denial of Sustainability (EDoS) in Cloud Computing Using In-cloud Scrubber Service, 2012 Fourth International Conference on Computational Intelligence and Communication Networks (CICN),IEEE 2012.
[21] Naresh Kumar, M., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A., Kumar, M. “Mitigating economic denial of sustainability (edos) in cloud computing using in-cloud scrubber service”, In: Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on. 2012, p. 535–539. doi:10.1109/CICN.2012.149.
[22] ReviewMyLife.co.uk. 2011. Amazon CloudFront and S3 maximum cost. http://www.reviewmylife .co.uk/blog /2011/05/19/amazon-cloudfront-and-s3-maximum-cost/. (2011).
[23] S VivinSandar, SudhirShenai ”Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks”. International Journal of Computer Applications (0975 – 8887) Volume 41– No.20, March 2012.
[24] Soon HinKhor Akihiro Nakao, “sPow On-Demand Cloud-based eDDoS Mitigation Mechanism”Fifth Workshop on Hot Topics in System Dependability
[25] Sqalli, Mohammed H., Fahd Al-Haidari, and Khaled Salah. "EDoS Shield-A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing." Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on. IEEE, 2011.
[26] Wael Alosaimi and Khalid Al-Begain. An Enhanced Economical Denial of Sustainability Mitigation System for the Cloud. 2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies.