Issue No. 02 - March-April (2013 vol. 15)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2012.43
Joseph Idziorek , Iowa State University
Mark F. Tannian , Iowa State University
Doug Jacobson , Iowa State University
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's financial burden.
Cloud computing, Pricing, Computational modeling, Web servers, Computer crime, Quality of service, Bandwidth, information technology, fraudulent resource consumption attack, public cloud computing, utility pricing model, security, DDoS, prevention, detection, attribution, mitigation
M. F. Tannian, J. Idziorek and D. Jacobson, "The Insecurity of Cloud Utility Models," in IT Professional, vol. 15, no. , pp. 22-27, 2013.