The Community for Technology Leaders
Green Image
Issue No. 02 - March-April (2013 vol. 15)
ISSN: 1520-9202
pp: 22-27
Joseph Idziorek , Iowa State University
Mark F. Tannian , Iowa State University
Doug Jacobson , Iowa State University
ABSTRACT
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's financial burden.
INDEX TERMS
Cloud computing, Pricing, Computational modeling, Web servers, Computer crime, Quality of service, Bandwidth, information technology, fraudulent resource consumption attack, public cloud computing, utility pricing model, security, DDoS, prevention, detection, attribution, mitigation
CITATION

M. F. Tannian, J. Idziorek and D. Jacobson, "The Insecurity of Cloud Utility Models," in IT Professional, vol. 15, no. , pp. 22-27, 2013.
doi:10.1109/MITP.2012.43
93 ms
(Ver 3.3 (11022016))