Issue No.02 - March-April (2013 vol.15)
Joseph Idziorek , Iowa State University
Mark F. Tannian , Iowa State University
Doug Jacobson , Iowa State University
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2012.43
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's financial burden.
Cloud computing, Pricing, Computational modeling, Web servers, Computer crime, Quality of service, Bandwidth, information technology, fraudulent resource consumption attack, public cloud computing, utility pricing model, security, DDoS, prevention, detection, attribution, mitigation
Joseph Idziorek, Mark F. Tannian, Doug Jacobson, "The Insecurity of Cloud Utility Models", IT Professional, vol.15, no. 2, pp. 22-27, March-April 2013, doi:10.1109/MITP.2012.43