Issue No. 02 - March-April (2013 vol. 15)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2012.43
Mark F. Tannian , Iowa State University
Joseph Idziorek , Iowa State University
Doug Jacobson , Iowa State University
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's financial burden.
Cloud computing, Pricing, Computational modeling, Web servers, Computer crime, Quality of service, Bandwidth, information technology, fraudulent resource consumption attack, public cloud computing, utility pricing model, security, DDoS, prevention, detection, attribution, mitigation
Mark F. Tannian, Joseph Idziorek, Doug Jacobson, "The Insecurity of Cloud Utility Models", IT Professional, vol. 15, no. , pp. 22-27, March-April 2013, doi:10.1109/MITP.2012.43