Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism
@article{Xu2020TowardsYA, title={Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism}, author={Xiaoqiong Xu and Jin Li and Hongfang Yu and Long Luo and Xuetao Wei and Gang Sun}, journal={Digit. Commun. Networks}, year={2020}, volume={6}, pages={369-376} }
3 Citations
An Effective Mechanism to Mitigate Real-Time DDoS Attack
- Computer ScienceIEEE Access
- 2020
This paper provides a mechanism that not only detects the presence of a DDoS attacks but also identifies the route of attack and commences a process of mitigation at the initial stage of identification.
Distributed Slice Mobility Attack: A Novel Targeted Attack Against Network Slices of 5G Networks
- Computer ScienceIEEE Networking Letters
- 2021
It is shown that the performance and economic damage caused by the DSM attack is higher than the denial-of-service and Yo-Yo attacks and a few defense strategies are suggested to reduce the performance damage.
References
SHOWING 1-10 OF 36 REFERENCES
DDoS attack on cloud auto-scaling mechanisms
- Computer ScienceIEEE INFOCOM 2017 - IEEE Conference on Computer Communications
- 2017
The Yo-Yo attack is a new attack against the auto-scaling mechanism that can cause significant performance degradation in addition to economic damage and is harder to detect and requires less resources from the attacker compared to traditional DDoS.
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism
- Computer ScienceComput. Commun. Rev.
- 2015
The ’Yo-Yo attack’ is presented, an efficient attack on the auto-scaling mechanism, which results in an Economic Denial of Sustainability attack (EDoS) that is difficult to detect.
Detecting fraudulent use of cloud resources
- Computer ScienceCCSW '11
- 2011
This paper thoroughly describes the FRC attack and discusses why current application-layer DDoS detection schemes are not applicable to a more subtle attack, and proposes three detection metrics that together form the criteria for identifying a FRC attacks from that of normal web activity.
A Robust and Efficient Detection Model of DDoS Attack for Cloud Services
- Computer ScienceICA3PP
- 2015
Experiments show that no matter what type of IP spoofing technology and the attack traffic scale, detection model can accurately detect the DDoS attacks as early as possible.
Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
- Computer ScienceJ. Netw. Comput. Appl.
- 2016
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment
- Computer Science2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
- 2011
The result shows that CBF has a high scoring speed, a small storage requirement and an acceptable filtering accuracy, making it suitable for real-time filtering in cloud environment.
Mitigating Economic Denial of Sustainability (EDoS) in Cloud Computing Using In-cloud Scrubber Service
- Computer Science2012 Fourth International Conference on Computational Intelligence and Communication Networks
- 2012
For cloud computing to remain attractive, the DDoS threat is to be addressed before it triggers the billing mechanism, which can be addressed by using reactive/on-demand in-cloud eDDoS mitigation service (scrubber Service) for mitigating the application-layer and network-layer DDOS attacks with the help of an efficient client-puzzle approach.
An Enhanced Economical Denial of Sustainability Mitigation System for the Cloud
- Computer Science2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies
- 2013
The novelty of the proposed framework lies in decreasing the end-to-end latency for the legitimate user by testing only their first packet by using a layered defence system that checks the legitimacy of the users, their packets' integrity, and their traffic rate.
Distributed Denial of Service Attack and Defense
- Computer ScienceSpringerBriefs in Computer Science
- 2014
The author presents the latest developments in this increasingly crucial field along with background context and survey material, including the impact of DDoS attacks on cloud computing and cloud technology, and future directions of the field.
Survey of network-based defense mechanisms countering the DoS and DDoS problems
- Computer ScienceCSUR
- 2007
This survey analyzes the design decisions in the Internet that have created the potential for denial of service attacks and the methods that have been proposed for defense against these attacks, and discusses potential countermeasures against each defense mechanism.