Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism

@article{Xu2020TowardsYA,
  title={Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism},
  author={Xiaoqiong Xu and Jin Li and Hongfang Yu and Long Luo and Xuetao Wei and Gang Sun},
  journal={Digital Communications and Networks},
  year={2020},
  volume={6},
  pages={369-376}
}
Abstract Cloud platforms could automatically scale underlying network resources up and down in response to changes in the traffic load. Such auto-scaling mechanism can largely enhance the elasticity and the scalability of cloud platforms. However, it may introduce new security threats. For example, Yo-Yo attack is a newly disclosed attack against the cloud auto-scaling mechanism. Attackers periodically send bursts of traffic to cause the auto-scaling mechanism to oscillate between the scale-up… Expand
An Effective Mechanism to Mitigate Real-Time DDoS Attack
TLDR
This paper provides a mechanism that not only detects the presence of a DDoS attacks but also identifies the route of attack and commences a process of mitigation at the initial stage of identification. Expand
Distributed Slice Mobility Attack: A Novel Targeted Attack Against Network Slices of 5G Networks
Inter-slice mobility in 5G networks allows mobility of user sessions from one network slice to another. In this letter, we propose a novel targeted attack against network slices of 5G networks byExpand
Cloud computing simulators: A comprehensive review
TLDR
This review will enable the readers to compare the prominent simulators in terms of the supported model, architecture, and high-level features and provide recommendations regarding the choice of the most suitable tool for researchers, providers, and managers of cloud environment. Expand

References

SHOWING 1-10 OF 41 REFERENCES
DDoS attack on cloud auto-scaling mechanisms
TLDR
The Yo-Yo attack is a new attack against the auto-scaling mechanism that can cause significant performance degradation in addition to economic damage and is harder to detect and requires less resources from the attacker compared to traditional DDoS. Expand
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism
TLDR
The ’Yo-Yo attack’ is presented, an efficient attack on the auto-scaling mechanism, which results in an Economic Denial of Sustainability attack (EDoS) that is difficult to detect. Expand
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
TLDR
This work makes a novel attempt to identify the need of DDoS mitigation solutions involving multi-level information flow and effective resource management during the attack, and concludes that there is a strong requirement of solutions, which are designed keeping utility computing models in mind. Expand
Detecting fraudulent use of cloud resources
TLDR
This paper thoroughly describes the FRC attack and discusses why current application-layer DDoS detection schemes are not applicable to a more subtle attack, and proposes three detection metrics that together form the criteria for identifying a FRC attacks from that of normal web activity. Expand
A Robust and Efficient Detection Model of DDoS Attack for Cloud Services
TLDR
Experiments show that no matter what type of IP spoofing technology and the attack traffic scale, detection model can accurately detect the DDoS attacks as early as possible. Expand
Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
TLDR
This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends. Expand
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment
TLDR
The result shows that CBF has a high scoring speed, a small storage requirement and an acceptable filtering accuracy, making it suitable for real-time filtering in cloud environment. Expand
EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing
TLDR
This paper advocates a novel solution, named EDoS-Shield, to mitigate the Economic Denial of Sustainability (EDoS) attack in the cloud computing systems and designs a discrete simulation experiment to evaluate its performance and shows that it is a promising solution to mitigateThe EDoS. Expand
Entropy-Based Economic Denial of Sustainability Detection
TLDR
This paper introduces a novel EDoS detection method based on the study of entropy variations related with metrics taken into account when deciding auto-scaling actuations, which proves high accuracy and demonstrates the effectiveness of the proposal. Expand
Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges
TLDR
This work can help to understand how to make full use of SDN's advantages to defeat DDoS attacks in cloud computing environments and how to prevent SDN itself from becoming a victim of DDoSDoS attacks, which are important for the smooth evolution ofSDN-based cloud without the distraction ofDDoS attacks. Expand
...
1
2
3
4
5
...