Evaluating the impact of eDoS attacks to cloud facilities

作者: Gian-Luca Dei Rossi , Mauro Iacono , Andrea Marin

DOI: 10.4108/EAI.14-12-2015.2262650

关键词:

摘要: The complexity of modern cloud facilities requires attentive management policies that should encompass all aspects the system. Security is a critical issue, as intrusions, misuse or denial service attacks may damage both users and provider including its reputation on market. Disruptive happen fast, cause evident short term damages are usually result operations hard to disguise. On other hand, Energy oriented Denial Service (eDoS) aim at producing continuous minor damages, eventually with long consequences. These lasting difficult detect. In this paper we model analyse behaviour system under eDoS attack. We study impact in terms energy consumption an attack strategy previously proposed literature compare it strategies propose. Our findings show literature, based keeping close saturation, not optimal (from point view attacker) presence non-constant workload there trade-off between aggressiveness attacker duration order maximise damage.

参考文章(18)
Bruno Sericola, Gerardo Rubino, Markov Chains and Dependability Theory ,(2014)
Francesco Palmieri, Sergio Ricciardi, Ugo Fiore, Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area broadband and wireless computing, communication and applications. pp. 374- 379 ,(2011) , 10.1109/BWCCA.2011.66
Francesco Palmieri, Sergio Ricciardi, Ugo Fiore, Massimo Ficco, Aniello Castiglione, Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures The Journal of Supercomputing. ,vol. 71, pp. 1620- 1641 ,(2015) , 10.1007/S11227-014-1242-6
Attahiru Sule Alfa, Jungong Xue, Qiang Ye, Accurate computation of the smallest eigenvalue of a diagonally dominant M -matrix Mathematics of Computation. ,vol. 71, pp. 217- 236 ,(2002) , 10.1090/S0025-5718-01-01325-4
J.R. Artalejo, A. Economou, M.J. Lopez-Herrero, The maximum number of infected individuals in SIS epidemic models: Computational techniques and quasi-stationary distributions Journal of Computational and Applied Mathematics. ,vol. 233, pp. 2563- 2574 ,(2010) , 10.1016/J.CAM.2009.11.003
Zhenyu Wu, Mengjun Xie, Haining Wang, On Energy Security of Server Systems IEEE Transactions on Dependable and Secure Computing. ,vol. 9, pp. 865- 876 ,(2012) , 10.1109/TDSC.2012.70
Veronika Durcekova, Ladislav Schwartz, Nahid Shahmehri, Sophisticated Denial of Service attacks aimed at application layer 2012 ELEKTRO. pp. 55- 60 ,(2012) , 10.1109/ELEKTRO.2012.6225571
INGEMAR NÅSELL, Extinction and quasi-stationarity in the Verhulst logistic model. Journal of Theoretical Biology. ,vol. 211, pp. 11- 27 ,(2001) , 10.1006/JTBI.2001.2328
Isi Mitrani, Managing performance and power consumption in a server farm Annals of Operations Research. ,vol. 202, pp. 121- 134 ,(2013) , 10.1007/S10479-011-0932-1