2013 International Conference on Cloud Computing and Big Data 2013
DOI: 10.1109/cloudcom-asia.2013.51
|View full text |Cite
|
Sign up to set email alerts
|

Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks against Cloud Infrastructures

Abstract: Service providers of the cloud have witnessed a rapidly growing demand to provide services to end-users in a timely manner. Security vulnerabilities against the cloud infrastructure cannot be overlooked. Through exploitation of such weaknesses, the adversary class may disrupt routine cloud operations, and have a debilitating effect on the reputation of the service provider. One attack type specifically affecting cloud services is the Economic Denial of Sustainability (EDoS) attack. Through such a malicious att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…Hidden Servers/ Ports (P2) [37] Moving target approach to hide the servers [32] Secure ephemeral servers with authentication [40] Limits number of connections on hidden ports [41] Moving targets using server replica shuffling [42] Hidden server only visible to benign users [50] Proxy forwards benign requests to the server Restrictive Access (P3) [43] Admission control based on delayed response [44] Human behavior (rate) detection and access [32] Client reputation based prioritized access [40] Admission control puzzles and hidden ports…”
Section: Hidden Servers/ports (P2)mentioning
confidence: 99%
“…Hidden Servers/ Ports (P2) [37] Moving target approach to hide the servers [32] Secure ephemeral servers with authentication [40] Limits number of connections on hidden ports [41] Moving targets using server replica shuffling [42] Hidden server only visible to benign users [50] Proxy forwards benign requests to the server Restrictive Access (P3) [43] Admission control based on delayed response [44] Human behavior (rate) detection and access [32] Client reputation based prioritized access [40] Admission control puzzles and hidden ports…”
Section: Hidden Servers/ports (P2)mentioning
confidence: 99%
“…The extended values are: grep template.properties files, checking the template files or others (Baig and Binbeshr, 2013).…”
Section: Entering Wrong Passwordmentioning
confidence: 99%
“…With a prepared dictionary, the attack is completed by performing the grep command to get specific information. The extended values of this indicator are: virsh command, dump command or string command (Baig and Binbeshr, 2013).…”
Section: Entering Wrong Passwordmentioning
confidence: 99%
See 1 more Smart Citation
“…It has provided its users to use the data resources with the minimal data overhead. Cloud computing has three service models, four deployment models and five main characteristics [5] . These five characteristics have been shown in Fig.…”
Section: In Cloud Platformmentioning
confidence: 99%