Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization 2014
DOI: 10.1109/icrito.2014.7014767
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…EDoS attacks are usually directed against Cloud Computing infrastructures, which play an essential role in the emergent communication technologies. Because of this, Singh et al formally defined EDoS attacks as "threats which target is to make the costing model unsustainable and therefore making it no longer viable for a company to affordability use or pay for their Cloud-based infrastructure" [12]. EDoS are also tagged in the bibliography as Reduction of Quality (RoQ) threats [13], or Fraudulent Resource Consumption attacks (FRC) [14].…”
Section: Economic Denial Of Sustainability Attacksmentioning
confidence: 99%
“…EDoS attacks are usually directed against Cloud Computing infrastructures, which play an essential role in the emergent communication technologies. Because of this, Singh et al formally defined EDoS attacks as "threats which target is to make the costing model unsustainable and therefore making it no longer viable for a company to affordability use or pay for their Cloud-based infrastructure" [12]. EDoS are also tagged in the bibliography as Reduction of Quality (RoQ) threats [13], or Fraudulent Resource Consumption attacks (FRC) [14].…”
Section: Economic Denial Of Sustainability Attacksmentioning
confidence: 99%
“…In the example from above on {4, 2, 1, 3, 5}, every node is either the reference node∶ (1); reachable from the reference node in one hop: (2, 3); or reachable from the reference node in two hops: (4,5). Hence, it is unsurprising to see that the 2-hop graph of {4, 2, 1, 3, 5} is exactly a 1-hop graph where nodes 4 and 5 are closest to the reference node 1.…”
Section: Example Of the 5-node Casementioning
confidence: 99%
“…This causes the resources to dynamically scale to meet the demand (because of EDoS attack) resulting in a hefty bill for the customer. EDoS attack is considered as one of the concerns that has stalled many organizations from adopting or migrating their operations and/or data to the cloud [22]. This is because an EDoS attack targets the financial component of the service provider and customers; which has high visibility on the impact of such attacks.…”
Section: Introductionmentioning
confidence: 99%