EDoS-shield - A two-steps mitigation technique against EDoS attacks in cloud computing

Mohammed H. Sqalli, Fahd Al-Haidari, Khaled Salah

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

118 Scopus citations

Abstract

Cloud computing is currently one of the most hyped information technology fields and it has become one of the fastest growing segments of IT. Cloud computing allows us to scale our servers in magnitude and availability in order to provide services to a greater number of end users. Moreover, adopters of the cloud service model are charged based on a pay-per-use basis of the cloud's server and network resources, aka utility computing. With this model, a conventional DDoS attack on server and network resources is transformed in a cloud environment to a new breed of attack that targets the cloud adopter's economic resource, namely Economic Denial of Sustainability attack (EDoS). In this paper, we advocate a novel solution, named EDoS-Shield, to mitigate the Economic Denial of Sustainability (EDoS) attack in the cloud computing systems. We design a discrete simulation experiment to evaluate its performance and the results show that it is a promising solution to mitigate the EDoS.

Original languageBritish English
Title of host publicationProceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011
Pages49-56
Number of pages8
DOIs
StatePublished - 2011
Event4th IEEE/ACM International Conference on Cloud and Utility Computing, UCC 2011 - Melbourne, VIC, Australia
Duration: 5 Dec 20118 Dec 2011

Publication series

NameProceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011

Conference

Conference4th IEEE/ACM International Conference on Cloud and Utility Computing, UCC 2011
Country/TerritoryAustralia
CityMelbourne, VIC
Period5/12/118/12/11

Keywords

  • Cloud Computing
  • EDoS
  • Mitigation
  • Overlay Network
  • Virtual Firewall

Fingerprint

Dive into the research topics of 'EDoS-shield - A two-steps mitigation technique against EDoS attacks in cloud computing'. Together they form a unique fingerprint.

Cite this