Search For:

Displaying 1-5 out of 5 total
The Insecurity of Cloud Utility Models
Found in: IT Professional
By Joseph Idziorek,Mark F. Tannian,Doug Jacobson
Issue Date:March 2013
pp. 22-27
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's fina...
Security across the curriculum and beyond
Found in: 2012 IEEE Frontiers in Education Conference (FIE)
By Joseph Idziorek,Julie Rursch,Doug Jacobson
Issue Date:October 2012
pp. 1-6
Society's dependency on information technology has drastically outpaced educational curricula and the opportunities that universities and higher education institutes provide to students from both technical (e.g., computer engineering, computer science) and...
Workshop: Teaching computer security literacy to the masses: A practical approach
Found in: 2012 IEEE Frontiers in Education Conference (FIE)
By Doug Jacobson,Julie Rursch,Joseph Idziorek
Issue Date:October 2012
pp. 1-2
We are losing the battle in cyber security. We heavily rely on technology as the main defense, instead of recognizing that the easiest attack vectors are the people who operate the computers. The general public does not understand the decisions they make e...
Attribution of Fraudulent Resource Consumption in the Cloud
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Joseph Idziorek,Mark Tannian,Doug Jacobson
Issue Date:June 2012
pp. 99-106
Obligated by a utility pricing model, Internet-facing web resources hosted in the public cloud are vulnerable to Fraudulent Resource Consumption (FRC) attacks. Unlike an application-layer DDoS attack that consumes resources with the goal of disrupting shor...
Exploiting Cloud Utility Models for Profit and Ruin
Found in: Cloud Computing, IEEE International Conference on
By Joseph Idziorek,Mark Tannian
Issue Date:July 2011
pp. 33-40
This paper discusses an attack on the cloud computing model by which an attacker subtly exploits a fundamental vulnerability of current utility compute models over a sustained period of time. Internet-accessible cloud services expose resources that are met...