SEDoS-7: A proactive mitigation approach against EDoS attacks in cloud computing

Flexible and dynamic services on Cloud Computing (CC) are attracting all types of organizations either big or small, which endow with immense potential to be a game-changer in business optimization and growth. The infrastructure can be fully or partially outsourced and eliminates the need for managing and maintaining expensive internal IT infrastructure which is one noteworthy capital savings for the companies. CC and Software Defined Networking (SDN) are two promising technologies with diverse features and has the potential to dynamically adopt changes without disrupting the web services which was earlier a barrier for On-Premise (On-Prem) and Hosted Solutions. Moreover, dynamic nature of CC and SDN has features to overcome the shortfall compared to the traditional services. A conventional Distributed Denial of Service (DDoS) attack on the server and network resources but In a cloud environment the DDoS attack target the service provider's economic resources which transformed into a new subclass, namely Economic Denial of Sustainability attack (EDoS). In this paper, we put forward an elucidation, namely Software Defined EDoS mitigation at application layer 7 of OSI model (SEDoS-7) with a primary focus on EDOS mitigation.

[1]  P. Sujatha,et al.  Mitigating Economic Denial of Sustainability (EDoS) in Cloud Computing Using In-cloud Scrubber Service , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[2]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[3]  Zahid Anwar,et al.  EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments , 2013, INMIC.

[4]  Khaled Salah,et al.  Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[5]  Wanlei Zhou,et al.  Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..

[6]  R. Anitha,et al.  Mitigation of Application Traffic DDoS Attacks with Trust and AM Based HMM Models . , 2010 .

[7]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[8]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[9]  Khaled Salah,et al.  EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.