An experimental evaluation of the impact of the EDoS attacks against cloud computing services using AWS

  • Authors

    • Suneetha Bulla
    • B. Basaveswara Rao
    • K. Gangadhara Rao
    • K. Chandan
    2017-12-31
    https://doi.org/10.14419/ijet.v7i1.5.9147
  • Cloud computing, single category of service, DDoS attack, EDoS attack, Amazon internet Services.
  • Cloud computing is that the one among the quickest making and rising development in IT trade on pay-as – you-go premise. Flexibility is that the one among the properties of the cloud computing, it exhibits the response for DDoS ambush and created new quite strike significantly EDoS assault .This paper displays the impact of EDoS assaults on the cloud computing services, touching on single category of service. A check demonstrate was made public, performed associated contrasted and an expositive lining model. The trial test-bed was directed on Amazon internet Services cloud platform, it catches the cloud edges and incorporates range of execution measurements and value measurements, as an instance, range of running cases on the cloud, latency or latency , usage of distributed computing assets, throughput, and also the caused value as a result of the assault. The outcomes square measure introduced and conclusions square measure talked concerning.

  • References

    1. [1] Gartner, Gartner Identifies the Top 10 Strategic Technologies for 2015. Analyst Examine Top Industry Trends at Gartner Symposium/ITxpo, Orlando (2015).

      [2] http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf

      [3] David Raths August (2008). Cloud Computing: public-Sector Opportunities Emerge. Available at: http://www.govtech.com/gt/articles/387269 .

      [4] Amazon web services, auto scaling. http://aws.amazon.com/autoscaling/ .

      [5] S. Rajagopalan et al. (2013). Split/merge: System support for elastic execution in virtual middleboxes. In NSDI.

      [6] Hoff, C.: The economic denial of sustainability concept. http://rationalsecurity.typepad.com/blog/2008/11/index.html

      [7] Z. A. Baig and F. Binbeshr, (2013). Controlled virtual resource access to mitigate economic denial of sustainability (edos) attacks against cloud infrastructures. In Cloud Computing and Big Data (CloudCom-Asia).

      [8] F. Al-Haidari, et al. (2015). Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services, (Arab J Sci Eng), Springer.

      [9] Gian-Luca Dei Rossi et al. (2015). Evaluating the impact of eDoS attacks to cloud facilities : VALUETOOLS 2015, December 14-16, Berlin, Germany.

      [10] Khaled Salah et al. (2015) . “An Analytical Model for Estimating Cloud Resources of Elastic Servicesâ€: Springer Journal.

      [11] Saini, B.; Somani, G. (2014): Index page based EDoS attacks in infrastructure cloud. In: Recent Trends in Computer Networks and Distributed Systems Security, pp. 382–395.

      [12] Salah, K.; El-Badawi, K. (2003): Performance evaluation of interrupt driven kernels in gigabit networks. In: Proceedings of the 2003 IEEE Conference on Global Telecommunications, (IEEE GLOBECOM 2003), San Francisco, USA, pp. 3953-3957, 1–5 Dec (2003)

      [13] Sqalli, M.H. et al. (2011): EDoS-shield-a two-steps mitigation technique against edos attacks in cloud computing. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 49–56.

      [14] Saeed Alsowail et al. (2015): An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud: Arab J Sci Eng (2016) 41:5037–5047, Springer Journal.

      [15] Al-Haidari, F. et al. (2012): Enhanced EDoS-Shield for mitigating EDoS attacks originating from spoofed IP addresses. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1167–1174.

      [16] Wael Alosaimi and Khalid Al- Begain (2013): A New Method to Mitigate the Impacts of Economical Denial of Sustainability Attacks Against the Cloud : ISBN: 978-1-902560-27-4 © PGNet .

      [17] Somani et al. (2015): DDoS/EDoS attack in cloud: affecting everyone out there!. In: SIN (2015).

      [18] Shi, Y. et al. (2011): An energy-efficient scheme for cloud resource provisioning based on cloudSim. In: 2011 IEEE International Conference on Cluster Computing (CLUSTER), Austin, TX, pp. 595–599.

      [19] Calheiros, R. et al.(2011): Virtual machine provisioning based on analytical performance and QoS in cloud computing environments. In: International Conference on Parallel Processing (ICPP), Taipei City, pp. 295–304.

      [20] AWS Documentation, AWS Web Application Hosting for Microsoft Windows. http://docs.amazonweb services.com /getting started/latest/wah/web-app-hosting intro. html?r=1052

      [21] Amazon, Amazon LoadBalancer Service. http://aws.amazon.com/elasticload balancing/

      [22] Buyya,R, et al. (2010): InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: The 10th International Conference on Algorithms and Architectures for Parallel Processing, Busan, Korea.

      [23] Bellenger, D. et al. (2011): Scaling in cloud environments. In: Proceedings of the 15th WSEAS International Conference on Computers, Wisconsin, pp. 145–150.

      [24] Idziorek, J. (2010): Discrete event simulation model for analysis of horizontal scaling in the cloud computing model. In: Proceedings of the 2010 Winter Simulation Conference, pp. 3004–3014.

      [25] Amazon Auto Scaling Developer Guide. Amazon Web Services LLC (2012).

      [26] Web application hosting in the AWScloud: best practices. Amazon Web Services LLC (2010).

      [27] Amazon EC2: https://aws.amazon.com/ec2/

      [28] Amazon RDS: https://aws.amazon.com/rds/

      [29] Amazon S3: https://aws.amazon.com/s3/

      [30] Amazon Rote 53: https://aws.amazon.com/route53/

      [31] Amazon Cloud watch: https://aws.amazon.com/cloudwatch/

      [32] Amazon EC2 Pricing. http://aws.amazon.com/ec2/pricing/

      [33] Rajesh, M., and J. M. Gnanasekar. "Congestion Control Using AODV Protocol Scheme For Wireless AD-HOC Network." Advances in Computer Science and Engineering 16.1/2 (2016): 19.

      [34] S.V.Manikanthan and K.Baskaran “Low Cost VLSI Design Implementation of Sorting Network for ACSFD in Wireless Sensor Networkâ€, CiiT International Journal of Programmable Device Circuits and Systems,Print: ISSN 0974 – 973X & Online: ISSN 0974 – 9624, Issue : November 2011, PDCS112011008.

      [35] T. Padmapriya and V.Saminadan, “Improving Performance of Downlink LTE-Advanced Networks Using Advanced Networks Using Advanced feedback Mechanisms and SINR Modelâ€, International Conference on Emerging Technology (ICET), vol.7, no.1, pp: 93, March 2014.

  • Downloads

  • How to Cite

    Bulla, S., Basaveswara Rao, B., Gangadhara Rao, K., & Chandan, K. (2017). An experimental evaluation of the impact of the EDoS attacks against cloud computing services using AWS. International Journal of Engineering & Technology, 7(1.5), 202-208. https://doi.org/10.14419/ijet.v7i1.5.9147