Inmic 2013
DOI: 10.1109/inmic.2013.6731321
|View full text |Cite
|
Sign up to set email alerts
|

EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(22 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…They allow anticipating harmful situations facilitating proactive responses, but must be complemented by reactive solutions. Major efforts towards mitigation EDoS threats focus on deploying access control mechanisms, as is the case of Crypto-puzzles [30][31][32], Graphical Turing tests [26,33] or reputation systems [34,35]. They are effective, but as highlighted in [23], resolving hard tests or deploying complex reputation schemes consume additional resources at both client and server sides, and significantly affect the Quality of Experience (QoE) on the protected environment.…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…They allow anticipating harmful situations facilitating proactive responses, but must be complemented by reactive solutions. Major efforts towards mitigation EDoS threats focus on deploying access control mechanisms, as is the case of Crypto-puzzles [30][31][32], Graphical Turing tests [26,33] or reputation systems [34,35]. They are effective, but as highlighted in [23], resolving hard tests or deploying complex reputation schemes consume additional resources at both client and server sides, and significantly affect the Quality of Experience (QoE) on the protected environment.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Because the performed research focused only on detect the threats, its response is to notify the detected incident. The report may trigger mitigation measures such as initiate more restrictive control access [30,31,33] or deploy source identification capabilities [24] (which decision and development is out of scope). Therefore, it entails a good complement to many of the proposals in the bibliography.…”
Section: Decision-making and Responsementioning
confidence: 99%
“…In this section we present published papers related to mitigate EDoS cloud computing system. EDoS Armor [13] protects Ecommerce applications in cloud environments, with the assumption that an attacker does not follow regular workflow by purchasing the items instead idle surfing. EDoS Armor proposes mutilayered defense system that includes two modules:…”
Section: Related Workmentioning
confidence: 99%
“…In the year 2013, Masood proposed an EDoS mitigation framework for E-Commerce applications [22]. It is a two-fold solution with an admission control and a congestion control.…”
Section: E Edos Armormentioning
confidence: 99%