Performance Modeling and Analysis of the EDoS-Shield Mitigation

被引:12
作者
Al-Haidari, F. [1 ]
Salah, K. [2 ]
Sqalli, M. [3 ]
Buhari, S. M. [4 ]
机构
[1] Dammam Univ, Comp Informat Syst Dept, Dammam, Saudi Arabia
[2] KUSTAR, Elect & Comp Engn Dept, Abu Dhabi, U Arab Emirates
[3] KFUPM, Dept Comp Engn, Dhahran, Saudi Arabia
[4] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
Cloud computing; Cloud security; DDoS attacks; EDoS attacks; Performance modeling and evaluation;
D O I
10.1007/s13369-016-2331-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud adoption by industry and governments has been on the rise for the past few years due to the obvious cloud technology advantages that include scalability, reliability, availability, agility, and cost efficiency. However, cloud security remains a main barrier for such adoption. Distributed denial of service (DDoS) attacks pose a serious security threat to cloud-hosted services and applications. In recent years, in addition to DDoS attacks, cloud systems are prone to be attacked by a new type of attacks known as economic denial of sustainability (EDoS). An EDoS attack targets the economic resources of the cloud adopter who gets billed and charged on a "pay-as-you-use" basis. In an EDoS attack, the attacker goal is to make the cloud system unaffordable and no longer economically acceptable for the cloud adopter. An EDoS-Shield is known to be an effective technique to mitigate such attacks, in which malicious requests are detected and dropped prior to reaching the cloud service nodes. In this paper, we model and study the performance of EDoS-Shield using queuing theory modeling. Various scenarios applicable to EDoS-shielding are considered and analyzed. We analyzed and compared the performance of proposed system in terms of key performance metrics which include response time, CPU utilization of allocated cloud compute resources, and system throughput.
引用
收藏
页码:793 / 804
页数:12
相关论文
共 46 条
  • [11] CHANDY KM, 1978, COMPUT SURV, V10, P281, DOI 10.1145/356733.356737
  • [12] CLAFFY K, 1998, P INET 1998 GEN SWIT
  • [13] Dawoud W., 2011, Systems and Virtualization Management (SVM), 2011 5th International DMTF Academic Alliance Workshop on, P1
  • [14] DONG Y., 2010, IEEE INT S HIGH PERF
  • [15] Gross Donald., 2008, FUNDAMENTALS QUEUING, VFourth
  • [16] Hoff C., CLOUD COMPUTING SECU
  • [17] Hu Ye., 2009, Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research, P101
  • [18] DISCRETE EVENT SIMULATION MODEL FOR ANALYSIS OF HORIZONTAL SCALING IN THE CLOUD COMPUTING MODEL
    Idziorek, Joseph
    [J]. PROCEEDINGS OF THE 2010 WINTER SIMULATION CONFERENCE, 2010, : 3004 - 3014
  • [19] Jain C, 2014, 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), P1
  • [20] Jing Bi, 2010, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD 2010), P370, DOI 10.1109/CLOUD.2010.53