EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing

作者: M. H. Sqalli , F. Al-Haidari , K. Salah

DOI: 10.1109/UCC.2011.17

关键词:

摘要: Cloud computing is currently one of the most hyped information technology fields and it has become fastest growing segments IT. allows us to scale our servers in magnitude availability order provide services a greater number end users. Moreover, adopters cloud service model are charged based on pay-per-use basis cloud's server network resources, aka utility computing. With this model, conventional DDoS attack resources transformed environment new breed that targets adopter's economic resource, namely Economic Denial Sustainability (EDoS). In paper, we advocate novel solution, named EDoS-Shield, mitigate (EDoS) systems. We design discrete simulation experiment evaluate its performance results show promising solution EDoS.

参考文章(33)
Malliga Subramanian, Tamilarasi Angamuthu, An Autonomous Framework for Early Detection of Spoofed Flooding Attacks International Journal of Network Security. ,vol. 10, pp. 39- 50 ,(2010) , 10.6633/IJNS.201001.10(1).06
Mangalam Ravi, S. Narasimman, G. K. Arun Kumar, D. Karthikeyan, A Cryptographic Approach to Defend against IP Spoofing International Conference on Business Administration and Information Processing. pp. 290- 296 ,(2010) , 10.1007/978-3-642-12214-9_47
Robbert van Renesse, Luís Rodrigues, João Leitão, Balancing gossip exchanges in networks with firewalls international workshop on peer to peer systems. pp. 7- 7 ,(2010)
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford, CAPTCHA: using hard AI problems for security theory and application of cryptographic techniques. pp. 294- 311 ,(2003) , 10.1007/3-540-39200-9_18
Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, Carl A Gunter, None, Reconstructing hash reversal based proof of work schemes usenix conference on large scale exploits and emergent threats. pp. 10- 10 ,(2011)
Weili Huang, Jian Yang, New Network Security Based on Cloud Computing 2010 Second International Workshop on Education Technology and Computer Science. ,vol. 3, pp. 604- 609 ,(2010) , 10.1109/ETCS.2010.491
William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein, Using graphic turing tests to counter automated DDoS attacks against web servers computer and communications security. pp. 8- 19 ,(2003) , 10.1145/948109.948114
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, None, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems. ,vol. 25, pp. 599- 616 ,(2009) , 10.1016/J.FUTURE.2008.12.001