Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism

@article{Xu2020TowardsYA,
  title={Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism},
  author={Xiaoqiong Xu and Jin Li and Hongfang Yu and Long Luo and Xuetao Wei and Gang Sun},
  journal={Digit. Commun. Networks},
  year={2020},
  volume={6},
  pages={369-376}
}

Figures from this paper

An Effective Mechanism to Mitigate Real-Time DDoS Attack
TLDR
This paper provides a mechanism that not only detects the presence of a DDoS attacks but also identifies the route of attack and commences a process of mitigation at the initial stage of identification.
Distributed Slice Mobility Attack: A Novel Targeted Attack Against Network Slices of 5G Networks
TLDR
It is shown that the performance and economic damage caused by the DSM attack is higher than the denial-of-service and Yo-Yo attacks and a few defense strategies are suggested to reduce the performance damage.
Cloud computing simulators: A comprehensive review

References

SHOWING 1-10 OF 36 REFERENCES
DDoS attack on cloud auto-scaling mechanisms
TLDR
The Yo-Yo attack is a new attack against the auto-scaling mechanism that can cause significant performance degradation in addition to economic damage and is harder to detect and requires less resources from the attacker compared to traditional DDoS.
Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism
TLDR
The ’Yo-Yo attack’ is presented, an efficient attack on the auto-scaling mechanism, which results in an Economic Denial of Sustainability attack (EDoS) that is difficult to detect.
Detecting fraudulent use of cloud resources
TLDR
This paper thoroughly describes the FRC attack and discusses why current application-layer DDoS detection schemes are not applicable to a more subtle attack, and proposes three detection metrics that together form the criteria for identifying a FRC attacks from that of normal web activity.
A Robust and Efficient Detection Model of DDoS Attack for Cloud Services
TLDR
Experiments show that no matter what type of IP spoofing technology and the attack traffic scale, detection model can accurately detect the DDoS attacks as early as possible.
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment
TLDR
The result shows that CBF has a high scoring speed, a small storage requirement and an acceptable filtering accuracy, making it suitable for real-time filtering in cloud environment.
Mitigating Economic Denial of Sustainability (EDoS) in Cloud Computing Using In-cloud Scrubber Service
TLDR
For cloud computing to remain attractive, the DDoS threat is to be addressed before it triggers the billing mechanism, which can be addressed by using reactive/on-demand in-cloud eDDoS mitigation service (scrubber Service) for mitigating the application-layer and network-layer DDOS attacks with the help of an efficient client-puzzle approach.
An Enhanced Economical Denial of Sustainability Mitigation System for the Cloud
  • Wael Alosaimi, K. Al-Begain
  • Computer Science
    2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies
  • 2013
TLDR
The novelty of the proposed framework lies in decreasing the end-to-end latency for the legitimate user by testing only their first packet by using a layered defence system that checks the legitimacy of the users, their packets' integrity, and their traffic rate.
Distributed Denial of Service Attack and Defense
  • Shui Yu
  • Computer Science
    SpringerBriefs in Computer Science
  • 2014
TLDR
The author presents the latest developments in this increasingly crucial field along with background context and survey material, including the impact of DDoS attacks on cloud computing and cloud technology, and future directions of the field.
Survey of network-based defense mechanisms countering the DoS and DDoS problems
TLDR
This survey analyzes the design decisions in the Internet that have created the potential for denial of service attacks and the methods that have been proposed for defense against these attacks, and discusses potential countermeasures against each defense mechanism.
...
...