The Community for Technology Leaders
RSS Icon
Issue No.02 - March-April (2013 vol.15)
pp: 22-27
Joseph Idziorek , Iowa State University
Mark F. Tannian , Iowa State University
Doug Jacobson , Iowa State University
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's financial burden.
Cloud computing, Pricing, Computational modeling, Web servers, Computer crime, Quality of service, Bandwidth, information technology, fraudulent resource consumption attack, public cloud computing, utility pricing model, security, DDoS, prevention, detection, attribution, mitigation
Joseph Idziorek, Mark F. Tannian, Doug Jacobson, "The Insecurity of Cloud Utility Models", IT Professional, vol.15, no. 2, pp. 22-27, March-April 2013, doi:10.1109/MITP.2012.43
1. J. Idziorek and M. Tannian, "Exploiting Cloud Utility Models for Profit and Ruin," Proc. 2011 IEEE 4th Int'l Conf. Cloud Computing (Cloud 11), IEEE, 2011, pp. 33–40.
2. J. Idziorek, M. Tannian, and D. Jacobson, "Detecting Fraudulent Use of Cloud Resources," Proc. 3rd ACM Workshop on Cloud Computing Security Workshop (CCSW 11), ACM, 2011, pp. 61–72.
3. "Amazon EC2 Pricing," Amazon Web Services, 2012;
4. "Cloud Servers Pricing," Rackspace Cloud Servers, 2012; serverspricing.
5. S. Kandula et al., "Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds," Proc. 2nd Conf. Symp. Networked Systems Design & Implementation, Usenix, 2005, pp. 287–300.
6. L. Page, "Join in the Wikileaks DDoS War from your iPhone or iPad," The Register,10 Dec. 2010;
7. G. Stonebumer, A. Goguen, and A. Feringa, "Risk Management Guide for Information Technology Systems," NIST Special Publication 800-30, July 2002.
8. L. Constantin, "Denial-of-Service Attack Are on the Rise, Anti-DDoS Vendors Report," IDG News Service; 7 Feb. 2012; denialofservice_attacks_are_on_the_rise_antiddos_vendors_report.html.
9. S. Wen et al., "Cald: Surviving Various Application-layer DDoS Attacks that Mimic Flash Crowd," Proc. 2010 4th Int'l Conf. Network and System Sec urity (NSS 10), IEEE, 2010; pp. 247–254.
10. S. Ranjan et al., "DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks," IEEE/ACM Trans. Networking, Feb. 2009, pp. 26–39.
11. J. Idziorek, M. Tannian, and D. Jacobson, "Attribution of Fraudulent Resource Consumption in the Cloud," Proc. 2012 IEEE 5th Int'l Conf. Cloud Computing (Cloud 12), IEEE, 2012, pp. 99–106.
28 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool