Skip to main content

Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1132))

Included in the following conference series:

  • 1226 Accesses

Abstract

As many organizations are adopting cloud computing as this allows them to be more agile, flexible and efficient. Nevertheless, as with any new technologies, cloud computing also suffers from various issues especially in security and privacy. Distributed Denial of Service (DDoS) attack saturates server resources, e.g. web server, by flooding it with fake requests. This renders the server inaccessible to legitimate users. Nevertheless, if the server is hosted as a cloud service, DDoS attack will not be effective due to the elasticity nature of the cloud server. Thus, a new variant of the DDoS attack, called Economic Denial of Sustainability (EDoS) attack, has emerged. Since the cloud service is based on “pay-per-use” model, EDoS attack endeavors to scale up the resource usage over time to the point the purveyor of the server is financially incapable of sustaining the service due to the incurred unaffordable usage charges. The implication of EDoS attack is a major security implication as more elastic cloud services are being deployed. A new mechanism, EDoS Mitigation Mechanism (EMM), is proposed to address these shortcomings using OpenFlow and statistical techniques, i.e. Hellinger Distance and Entropy. The experiments clearly showed that EMM is able to detect and mitigate EDoS attacks effectively without the need for additional resource requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Strømmen-Bakhtiar, A.: Digital economy, business models, and cloud computing. In: Global Virtual Enterprises in Cloud Computing Environments, pp. 19–44 (2019)

    Chapter  Google Scholar 

  2. Brintha, N.C., Winowlin Jappes, J.T., Sukumaran, J.: Integrating SMEs through cloud: an industrial revolution. In: Organizational Transformation and Managing Innovation in the Fourth Industrial Revolution, pp. 143–164 (2019)

    Google Scholar 

  3. Adamov, A., Erguvan, M.: The truth about cloud computing as new paradigm in IT. In: IEEE International Conference on Application of Information and Communication Technologies, pp. 1–3 (2009)

    Google Scholar 

  4. Bhardwaj, S., Jain, L., Jain, S.: Cloud computing: a study of infrastructure as a service (IAAS). Int. J. Eng. Inf. Technol. 2(1), 60–63 (2010)

    Google Scholar 

  5. Ficco, M.: Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? Inf. Sci. 1(476), 474–490 (2019)

    Article  Google Scholar 

  6. Bhushan, K., Gupta, B.B.: Network flow analysis for detection and mitigation of fraudulent resource consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools Appl. 78(4), 4267–4298 (2019)

    Article  Google Scholar 

  7. Singh, P., Manickam, S., Rehman, S.U.: A survey of mitigation techniques against economic denial of sustainability (EDoS) attack on cloud computing architecture. In: 3rd IEEE International Conference on Reliability, Infocom Technologies, and Optimization (ICRITO) (Trends and Future Directions), pp. 1–4 (2014)

    Google Scholar 

  8. Hoff, C.: Cloud Computing Security: From DDoS (Distributed Denial of Service) To EDoS (Economic Denial of Sustainability). Blog (2008). Accessed 27 November 2008

    Google Scholar 

  9. Swami, R., Dave, M., Ranga, V.: Software-defined networking-based DDoS defense mechanisms. ACM Comput. Surv. (CSUR) 52(2), 28 (2019)

    Article  Google Scholar 

  10. Chaudhary, D., Bhushan, K., Gupta, B.B.: Survey on DDoS attacks and defense mechanisms in cloud and fog computing. Int. J. E-Serv. Mobile Appl. (IJESMA) 10(3), 61–83 (2018)

    Article  Google Scholar 

  11. Joshi, A., Vijayan, S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: IEEE International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2012)

    Google Scholar 

  12. Chapade, S.S., Pandey, K.U., Bhade, D.S.: Securing cloud servers against flooding-based DDoS attacks. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 524–528 (2013)

    Google Scholar 

  13. Khor, S.H., Nakao, A.: sPoW: on-demand cloud-based eDDoS mitigation mechanism. In: HotDep (Fifth Workshop on Hot Topics in System Dependability) (2009)

    Google Scholar 

  14. Green, J., Juen, J., Fatemieh, O., Shankesi, R., Jin, D.(Kevin), Gunter, C.A.: Reconstructing hash reversal based proof of work schemes. In: LEET (2011)

    Google Scholar 

  15. Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield a two-steps mitigation technique against EDoS attacks in cloud computing. In: Fourth IEEE International Conference on Utility and Cloud Computing, pp. 49–56, (2011)

    Google Scholar 

  16. Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Fourth International Conference on Computational Intelligence and Communication Networks, pp. 535–539 (2012)

    Google Scholar 

  17. Masood, M., Anwar, Z., Raza, S.A., Hur, M.A.: EDoS Armor: a cost-effective economic denial of sustainability attack mitigation framework for E-commerce applications in cloud environments. In: 16th IEEE International Multi Topic Conference (INMIC), pp. 37–42 (2013)

    Google Scholar 

  18. Chowdhury, F.Z., Idris, M.Y.I., Kiah, M.L.M., Ahsan, M.M.: EDoS eye: a game theoretic approach to mitigate economic denial of sustainability attack in cloud computing. In: 8th IEEE Control and System Graduate Research Colloquium (ICSGRC), pp. 164–169 (2017)

    Google Scholar 

  19. Shawahna, A., Abu-Amara, M., Mahmoud, A., Osais, Y.E.: EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans. Cloud Comput. (1), 1 (2018)

    Google Scholar 

  20. Bawa, P.S., Rehman, S.U., Manickam, S.: Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments. Int. J. Adv. Comput. Sci. Appl. 8(9), 51–58 (2017)

    Google Scholar 

  21. Sengar, H., Wang, H., Wijesekera, D., Jajodia, S.: Detecting VoIP floods using the Hellinger distance. IEEE Trans. Parallel Distrib. Syst. 19(6), 794–805 (2008)

    Article  Google Scholar 

  22. Shannon, C.E.: A note on the concept of entropy. Bell Syst. Tech. 27(1), 379–423 (1948)

    Article  Google Scholar 

  23. Shalimov, A., Zuikov, D., Zimarina, D., Pashkov, V., Smeliansky, R.: Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th Central & Eastern European Software Engineering Conference, Russia, p. 1, ACM (2013)

    Google Scholar 

  24. De Oliveira, R.L.S., Schweitzer, C.M., Shinoda, A.A., Prete, L.R.: Using mininet for emulation and prototyping software-defined networks. In: IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1–6 (2014)

    Google Scholar 

  25. Baig, Z.A., Sait, S.M., Binbeshr, F.: Controlled access to cloud resources for mitigating economic denial of sustainability (EdoS) attacks. Comput. Netw. 97(1), 31–47 (2016)

    Article  Google Scholar 

  26. Hulboj, M.M., Jurga, R.E.: Packet Sampling and Network Monitoring (2007)

    Google Scholar 

  27. ARBOR Networks: Worldwide Infrastructure Security Report XI (2016). https://www.arbornetworks.com/images/documents/WISR2016_EN_Web

Download references

Acknowledgments

This research was supported by National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), Malaysia. In collaboration with ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design (SUTD), Singapore.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafiq Ul Rehman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, P., Ul Rehman, S., Manickam, S. (2020). Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2019. Communications in Computer and Information Science, vol 1132. Springer, Singapore. https://doi.org/10.1007/978-981-15-2693-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2693-0_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2692-3

  • Online ISBN: 978-981-15-2693-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy