We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks

by S Vivinsandar, Sudhir Shenai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 20
Year of Publication: 2012
Authors: S Vivinsandar, Sudhir Shenai
10.5120/5807-8063

S Vivinsandar, Sudhir Shenai . Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks. International Journal of Computer Applications. 41, 20 ( March 2012), 11-16. DOI=10.5120/5807-8063

@article{ 10.5120/5807-8063,
author = { S Vivinsandar, Sudhir Shenai },
title = { Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 20 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number20/5807-8063/ },
doi = { 10.5120/5807-8063 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:05.465597+05:30
%A S Vivinsandar
%A Sudhir Shenai
%T Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 20
%P 11-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

"Cloud Computing", a new wave in the Internet revolution, transforms the kind of services provided over the Internet. The Cloud Services can be viewed from two perspectives, one as Cloud Service Provider and the other as Cloud Service Consumer. Assurance of security in the Cloud Service is a major challenge for the Providers, as it's the biggest concern for the Consumers to opt for the service, which in turn decides the prospects of the business in Cloud Service. The Security can be administered in the Cloud at various levels and for several types of attacks. The threats and the attacks on the Cloud service can be common prevailing attacks in the internet or can be cloud specific. This paper deals about the threats and the counter measures of the prevailing DDoS attacks on the Cloud Environment as well as the Cloud Specific Vulnerabilities to these attacks. In specific, HTTP and XMLbased DDoS attacks on the cloud service are experimented under proposed security framework for EDoS Protection. A Cloud Service was hosted on Amazon EC2. The Service was targeted by HTTP, XML DDoS attacks from several nodes, which lead to the scaling of the service by consuming more Amazon EC2 resources, which in turn lead to Economic Denial of Sustainability to the Cloud Service under attack. Thus this paper explores the transformation of traditional Distributed denial-of-service (DDoS) attack into cloud specific Economic Denial of Sustainability (EDoS) attack.

References
  1. Denial-of-service attack ,Wikipedia, http://en. wikipedia. org/wiki/Denial-of-service_attack
  2. Bernd Grobauer, Tobias Walloschek, and ElmarStöcker "Understanding Cloud Computing Vulnerabilities" Cloud Computing, Copublished By The IEEE Computer And Reliability Societies
  3. KrešimirPopovi?, ŽeljkoHocenski "Cloud computing security issues and challenges", MIPRO 2010, May 24-28, 2010, Opatija, Croatia
  4. Paul Wooley ,Tyco Electronics ,"Identifying Cloud Computing Security Risks"University of Oregon ,Applied Information Management Program, Feb 2011
  5. V VenkateswaraRao , G. Suresh Kumar, Azam Khan, S SanthiPriya,"Threats and Remedies in Cloud"Journal of Current Computer Science and Technology, Vol. 1 Issue 4
  6. 101-106
  7. A Survey on Cloud Computing Security,Challenges and Threats", Journal of Current Computer Science and Technology Vol. 1 Issue 4
  8. 101-106
  9. DimitriosZissis , And DimitriosLekkas,"Addressing cloud computing security issues Future Generation Computer Systems", Future Generation Computer Systems.
  10. Cloud Security Alliance,"Critical Areas of Focus in Cloud Computing" ,Prepared by the Cloud Security Alliance ,December 2009
  11. KetkiArora ,Krishan Kumar, And Monika Sachdeva ," Impact analysis of DDOs Attack", International Journal on Computer Science and Engineering (IJCSE)- Vol. 3 No. 2 Feb 2011
  12. Metz C "DDoS attack rains down on Amazon cloud", The Register,Online Article, http://www. theregister. co. uk/2009/10/05/amazon_bitbucket_outage,
  13. IrfanGul, M. Hussain "Distributed Cloud Intrusion Detection Model" International Journal of Advanced Science and Technology Vol. 34, September, 2011
  14. Shantanu Pal, SunirmalKhatua, NabenduChaki, SugataSanyal ,"A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security", Annals of Faculty Engineering Hunedoara International Journal of Engineering; scheduled for publication in Vol. 10, Issue 1, February, 2012. ISSN: 1584-2665.
  15. Qi Chen, Wenmin Lin, Wanchun Dou , Shui Yu "CBF A Packet Filtering Method for DDoS Attack Defense in Cloud Environment"2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing.
  16. Siqin Zhao, Kang Chen, WeiminZheng ,"Defend Against Denial of Service Attack with VMM" , Eighth International Conference on Grid and Cooperative Computing
  17. Mohammed H. Sqalli Fahd Al-HaidariKhaledSalah,"EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing ",Fourth IEEE International Conference on Utility and Cloud Computing.
  18. Ashley Chonka,Yang Xiang n, Wanlei Zhou, AlessioBonti, "Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks", Journal of Network and Computer Applications 34 (2011) 1097–1107
  19. Soon HinKhor Akihiro Nakao, "sPow On-Demand Cloud-based eDDoS Mitigation Mechanism"Fifth Workshop on Hot Topics in System Dependability
  20. Mehmet Yildiz, JemalAbawajy, TuncayErcan and Andrew Bernoth,"A Layered Security Approach for Cloud Computing Infrastructure", 10th International Symposium on Pervasive Systems, Algorithms, and Networks.
  21. Ricardo Neisse, DominikHolling, Alexander Pretschner,"Implementing Trust in Cloud Infrastructures",2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
  22. Meiko Jensen, J¨orgSchwenk , Nils Gruschka, Luigi Lo Iacono ,"On Technical Security Issues in Cloud Computing", IEEE International Conference on Cloud Computing.
  23. Nils Gruschka and Luigi Lo Iacono,"Vulnerable Cloud: SOAP Message Security Validation Revisited", IEEE International Conference on Web Services
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Service Security Ddos Attack Edos Attack