Abstract
As many organizations are adopting cloud computing as this allows them to be more agile, flexible and efficient. Nevertheless, as with any new technologies, cloud computing also suffers from various issues especially in security and privacy. Distributed Denial of Service (DDoS) attack saturates server resources, e.g. web server, by flooding it with fake requests. This renders the server inaccessible to legitimate users. Nevertheless, if the server is hosted as a cloud service, DDoS attack will not be effective due to the elasticity nature of the cloud server. Thus, a new variant of the DDoS attack, called Economic Denial of Sustainability (EDoS) attack, has emerged. Since the cloud service is based on “pay-per-use” model, EDoS attack endeavors to scale up the resource usage over time to the point the purveyor of the server is financially incapable of sustaining the service due to the incurred unaffordable usage charges. The implication of EDoS attack is a major security implication as more elastic cloud services are being deployed. A new mechanism, EDoS Mitigation Mechanism (EMM), is proposed to address these shortcomings using OpenFlow and statistical techniques, i.e. Hellinger Distance and Entropy. The experiments clearly showed that EMM is able to detect and mitigate EDoS attacks effectively without the need for additional resource requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Strømmen-Bakhtiar, A.: Digital economy, business models, and cloud computing. In: Global Virtual Enterprises in Cloud Computing Environments, pp. 19–44 (2019)
Brintha, N.C., Winowlin Jappes, J.T., Sukumaran, J.: Integrating SMEs through cloud: an industrial revolution. In: Organizational Transformation and Managing Innovation in the Fourth Industrial Revolution, pp. 143–164 (2019)
Adamov, A., Erguvan, M.: The truth about cloud computing as new paradigm in IT. In: IEEE International Conference on Application of Information and Communication Technologies, pp. 1–3 (2009)
Bhardwaj, S., Jain, L., Jain, S.: Cloud computing: a study of infrastructure as a service (IAAS). Int. J. Eng. Inf. Technol. 2(1), 60–63 (2010)
Ficco, M.: Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? Inf. Sci. 1(476), 474–490 (2019)
Bhushan, K., Gupta, B.B.: Network flow analysis for detection and mitigation of fraudulent resource consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools Appl. 78(4), 4267–4298 (2019)
Singh, P., Manickam, S., Rehman, S.U.: A survey of mitigation techniques against economic denial of sustainability (EDoS) attack on cloud computing architecture. In: 3rd IEEE International Conference on Reliability, Infocom Technologies, and Optimization (ICRITO) (Trends and Future Directions), pp. 1–4 (2014)
Hoff, C.: Cloud Computing Security: From DDoS (Distributed Denial of Service) To EDoS (Economic Denial of Sustainability). Blog (2008). Accessed 27 November 2008
Swami, R., Dave, M., Ranga, V.: Software-defined networking-based DDoS defense mechanisms. ACM Comput. Surv. (CSUR) 52(2), 28 (2019)
Chaudhary, D., Bhushan, K., Gupta, B.B.: Survey on DDoS attacks and defense mechanisms in cloud and fog computing. Int. J. E-Serv. Mobile Appl. (IJESMA) 10(3), 61–83 (2018)
Joshi, A., Vijayan, S., Joshi, B.K.: Securing cloud computing environment against DDoS attacks. In: IEEE International Conference on Computer Communication and Informatics (ICCCI), pp. 1–5 (2012)
Chapade, S.S., Pandey, K.U., Bhade, D.S.: Securing cloud servers against flooding-based DDoS attacks. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 524–528 (2013)
Khor, S.H., Nakao, A.: sPoW: on-demand cloud-based eDDoS mitigation mechanism. In: HotDep (Fifth Workshop on Hot Topics in System Dependability) (2009)
Green, J., Juen, J., Fatemieh, O., Shankesi, R., Jin, D.(Kevin), Gunter, C.A.: Reconstructing hash reversal based proof of work schemes. In: LEET (2011)
Sqalli, M.H., Al-Haidari, F., Salah, K.: EDoS-shield a two-steps mitigation technique against EDoS attacks in cloud computing. In: Fourth IEEE International Conference on Utility and Cloud Computing, pp. 49–56, (2011)
Kumar, M.N., Sujatha, P., Kalva, V., Nagori, R., Katukojwala, A.K., Kumar, M.: Mitigating economic denial of sustainability (EDoS) in cloud computing using in-cloud scrubber service. In: Fourth International Conference on Computational Intelligence and Communication Networks, pp. 535–539 (2012)
Masood, M., Anwar, Z., Raza, S.A., Hur, M.A.: EDoS Armor: a cost-effective economic denial of sustainability attack mitigation framework for E-commerce applications in cloud environments. In: 16th IEEE International Multi Topic Conference (INMIC), pp. 37–42 (2013)
Chowdhury, F.Z., Idris, M.Y.I., Kiah, M.L.M., Ahsan, M.M.: EDoS eye: a game theoretic approach to mitigate economic denial of sustainability attack in cloud computing. In: 8th IEEE Control and System Graduate Research Colloquium (ICSGRC), pp. 164–169 (2017)
Shawahna, A., Abu-Amara, M., Mahmoud, A., Osais, Y.E.: EDoS-ADS: an enhanced mitigation technique against economic denial of sustainability (EDoS) attacks. IEEE Trans. Cloud Comput. (1), 1 (2018)
Bawa, P.S., Rehman, S.U., Manickam, S.: Enhanced mechanism to detect and mitigate economic denial of sustainability (EDoS) attack in cloud computing environments. Int. J. Adv. Comput. Sci. Appl. 8(9), 51–58 (2017)
Sengar, H., Wang, H., Wijesekera, D., Jajodia, S.: Detecting VoIP floods using the Hellinger distance. IEEE Trans. Parallel Distrib. Syst. 19(6), 794–805 (2008)
Shannon, C.E.: A note on the concept of entropy. Bell Syst. Tech. 27(1), 379–423 (1948)
Shalimov, A., Zuikov, D., Zimarina, D., Pashkov, V., Smeliansky, R.: Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th Central & Eastern European Software Engineering Conference, Russia, p. 1, ACM (2013)
De Oliveira, R.L.S., Schweitzer, C.M., Shinoda, A.A., Prete, L.R.: Using mininet for emulation and prototyping software-defined networks. In: IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1–6 (2014)
Baig, Z.A., Sait, S.M., Binbeshr, F.: Controlled access to cloud resources for mitigating economic denial of sustainability (EdoS) attacks. Comput. Netw. 97(1), 31–47 (2016)
Hulboj, M.M., Jurga, R.E.: Packet Sampling and Network Monitoring (2007)
ARBOR Networks: Worldwide Infrastructure Security Report XI (2016). https://www.arbornetworks.com/images/documents/WISR2016_EN_Web
Acknowledgments
This research was supported by National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), Malaysia. In collaboration with ST Engineering Electronics-SUTD Cyber Security Laboratory, Singapore University of Technology and Design (SUTD), Singapore.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, P., Ul Rehman, S., Manickam, S. (2020). Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2019. Communications in Computer and Information Science, vol 1132. Springer, Singapore. https://doi.org/10.1007/978-981-15-2693-0_9
Download citation
DOI: https://doi.org/10.1007/978-981-15-2693-0_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2692-3
Online ISBN: 978-981-15-2693-0
eBook Packages: Computer ScienceComputer Science (R0)