2017
DOI: 10.14419/ijet.v7i1.5.9147
|View full text |Cite
|
Sign up to set email alerts
|

An experimental evaluation of the impact of the EDoS attacks against cloud computing services using AWS

Abstract: Cloud computing is that the one among the quickest making and rising development in IT trade on pay-asyou-go premise. Flexibility is that the one among the properties of the cloud computing, it exhibits the response for DDoS ambush and created new quite strike significantly EDoS assault .This paper displays the impact of EDoS assaults on the cloud computing services, touching on single category of service. A check demonstrate was made public, performed associated contrasted and an expositive lining model. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…This type of attacks causes the interruption of cloud services to legitimate users by inordinate resource consumption which would automatically results in Service Level Agreement (SLA) violation. Most of the Cloud services are inherently elastic so the DDoS attacks are damaging the cloud service provider (CSP) economically but not its physical system or server assets [3]. This phenomenon is known as Economic Denial of Sustainability (EDoS) EDoS attack.…”
Section: Introductionmentioning
confidence: 99%
“…This type of attacks causes the interruption of cloud services to legitimate users by inordinate resource consumption which would automatically results in Service Level Agreement (SLA) violation. Most of the Cloud services are inherently elastic so the DDoS attacks are damaging the cloud service provider (CSP) economically but not its physical system or server assets [3]. This phenomenon is known as Economic Denial of Sustainability (EDoS) EDoS attack.…”
Section: Introductionmentioning
confidence: 99%
“…The attack makes the cloud unsustainable via fading the cloud billing to impose the cloud user's bill intended for the attack's activities. This issue can be averted by limiting or controlling resource allocation (RA) (Ribin Jones and Kumar 2019; Bulla et al 2018). Nevertheless, some most imperative advantages of CC will be restricted.…”
Section: Introductionmentioning
confidence: 99%