Performance Modeling and Analysis of the EDoS-Shield Mitigation

被引:12
作者
Al-Haidari, F. [1 ]
Salah, K. [2 ]
Sqalli, M. [3 ]
Buhari, S. M. [4 ]
机构
[1] Dammam Univ, Comp Informat Syst Dept, Dammam, Saudi Arabia
[2] KUSTAR, Elect & Comp Engn Dept, Abu Dhabi, U Arab Emirates
[3] KFUPM, Dept Comp Engn, Dhahran, Saudi Arabia
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
Cloud computing; Cloud security; DDoS attacks; EDoS attacks; Performance modeling and evaluation;
D O I
10.1007/s13369-016-2331-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud adoption by industry and governments has been on the rise for the past few years due to the obvious cloud technology advantages that include scalability, reliability, availability, agility, and cost efficiency. However, cloud security remains a main barrier for such adoption. Distributed denial of service (DDoS) attacks pose a serious security threat to cloud-hosted services and applications. In recent years, in addition to DDoS attacks, cloud systems are prone to be attacked by a new type of attacks known as economic denial of sustainability (EDoS). An EDoS attack targets the economic resources of the cloud adopter who gets billed and charged on a "pay-as-you-use" basis. In an EDoS attack, the attacker goal is to make the cloud system unaffordable and no longer economically acceptable for the cloud adopter. An EDoS-Shield is known to be an effective technique to mitigate such attacks, in which malicious requests are detected and dropped prior to reaching the cloud service nodes. In this paper, we model and study the performance of EDoS-Shield using queuing theory modeling. Various scenarios applicable to EDoS-shielding are considered and analyzed. We analyzed and compared the performance of proposed system in terms of key performance metrics which include response time, CPU utilization of allocated cloud compute resources, and system throughput.
引用
收藏
页码:793 / 804
页数:12
相关论文
共 46 条
  • [1] Al-Haidari F., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1167, DOI 10.1109/TrustCom.2012.146
  • [2] Alosaimi Wael, 2013, 2013 Seventh International Conference on Next-Generation Mobile Apps, Services and Technologies (NGMAST), P19, DOI 10.1109/NGMAST.2013.13
  • [3] [Anonymous], 2009, TECHNICAL REPORT
  • [4] [Anonymous], 2011, INT C
  • [5] [Anonymous], 2009, INT 82599 10 GIG ETH
  • [6] [Anonymous], ACM CCS
  • [7] [Anonymous], 2000, Simulation modeling and analysis
  • [8] [Anonymous], 1975, QUEUEING SYSTEMS THE
  • [9] Arlitt M., 1997, IEEE ACM T NETWORK, V5, P815
  • [10] Calheiros R. N., 2011, 2011 International Conference on Parallel Processing, P295, DOI 10.1109/ICPP.2011.17