2016
DOI: 10.1016/j.comnet.2016.03.022
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attacks in cloud computing: Collateral damage to non-targets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 71 publications
(55 citation statements)
references
References 21 publications
0
55
0
Order By: Relevance
“…When the flooding of requests exceeds the computational capabilities of the hired services, the auto-scaling processes trigger the need of contract additional resources, which increases the bill that the client must pay. Sonami et al [14] studied the consequences of this increasing of costs, which have distinct impacts depending on the side. For example, in addition to the impact on the offered Quality of Service, the economic losses may become unsustainable for the clients, and consequently they probably will try to find a more profitable provider.…”
Section: Economic Denial Of Sustainability Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…When the flooding of requests exceeds the computational capabilities of the hired services, the auto-scaling processes trigger the need of contract additional resources, which increases the bill that the client must pay. Sonami et al [14] studied the consequences of this increasing of costs, which have distinct impacts depending on the side. For example, in addition to the impact on the offered Quality of Service, the economic losses may become unsustainable for the clients, and consequently they probably will try to find a more profitable provider.…”
Section: Economic Denial Of Sustainability Attacksmentioning
confidence: 99%
“…Because of this, Singh et al formally defined EDoS attacks as "threats which target is to make the costing model unsustainable and therefore making it no longer viable for a company to affordability use or pay for their Cloud-based infrastructure" [12]. EDoS are also tagged in the bibliography as Reduction of Quality (RoQ) threats [13], or Fraudulent Resource Consumption attacks (FRC) [14]. These intrusions take advantage of the "pay-as-you-go" accounting model offered by most of the Cloud Computing providers and their auto-scaling services [15].…”
Section: Economic Denial Of Sustainability Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…The target could be a servers computing capability or network bandwidth such that the legal users could not access the services provided ( Figure 2). EDoS attack is a special breed of DDoS attack that attack exploits auto scaling feature of cloud computing [9]. In EDoS attack, the goal in mind of the attacker is to manipulate service usage billing in orders of magnitude that could be disguised easily as legitimate use of the service [10].…”
Section: Figure 1 Cloud Computing Characteristics Service and Deplmentioning
confidence: 99%