메뉴 건너뛰기




Volumn 11, Issue 2, 2017, Pages 460-470

Introducing fraudulent energy consumption in cloud infrastructures: A new generation of denial-of-service attacks

Author keywords

Cloud infrastructures; denial of service; fraudulent energy consumption; intrusion prevention; low rate attacks

Indexed keywords

COMPUTER CRIME; DENIAL-OF-SERVICE ATTACK; ENERGY UTILIZATION; NETWORK SECURITY; PLATFORM AS A SERVICE (PAAS);

EID: 85027465865     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2015.2414822     Document Type: Article
Times cited : (40)

References (26)
  • 1
    • 84855860365 scopus 로고    scopus 로고
    • Evaluating network-based DoS attacks under the energy consumption perspective: New security issues in the coming green ICT area
    • F. Palmieri, S. Ricciardi, and U. Fiore, "Evaluating network-based DoS attacks under the energy consumption perspective: New security issues in the coming green ICT area, " in Proc. IEEE Int. Conf. BWCCA, 2011, pp. 374-379.
    • (2011) Proc IEEE Int. Conf. BWCCA , pp. 374-379
    • Palmieri, F.1    Ricciardi, S.2    Fiore, U.3
  • 2
    • 84881425324 scopus 로고    scopus 로고
    • Green- Aware security: Towards a new research field
    • L. Caviglione, A. Merlo, and M. Migliardi, "Green- Aware security: Towards a new research field, " J. Inf. Assurance Security, vol. 7, no. 5, pp. 338-346, 2012.
    • (2012) J. Inf. Assurance Security , vol.7 , Issue.5 , pp. 338-346
    • Caviglione, L.1    Merlo, A.2    Migliardi, M.3
  • 3
    • 84888101121 scopus 로고    scopus 로고
    • Analyzing job completion reliability and job energy consumption for a general map reduce infrastructure
    • Jul
    • J. Lin, F. Leu, and Y. Chen, "Analyzing job completion reliability and job energy consumption for a general map reduce infrastructure, " J. High Speed Netw, vol. 19, no. 3, pp. 203-214, Jul. 2013.
    • (2013) J. High Speed Netw , vol.19 , Issue.3 , pp. 203-214
    • Lin, J.1    Leu, F.2    Chen, Y.3
  • 4
    • 84866785864 scopus 로고    scopus 로고
    • On energy security of server systems
    • Nov
    • Z. Wu, M. Xie, and H. Wang, "On energy security of server systems, " IEEE Trans. Dependable Secure Comput, vol. 9, no. 6, pp. 865-876, Nov. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput , vol.9 , Issue.6 , pp. 865-876
    • Wu, Z.1    Xie, M.2    Wang, H.3
  • 5
    • 85028295216 scopus 로고    scopus 로고
    • Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
    • Palmieri F.,Ricciardi S.,Fiore U.,Castiglione A.,Ficco M.Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.Journal of Supercomputing 71(5),2015.pp:1620-1641
    • (2015) Journal of Supercomputing , vol.71 , Issue.5 , pp. 1620-1641
    • Palmieri, F.1    Ricciardi, S.2    Fiore, U.3    Ficco, M.4    Castiglione, A.5
  • 6
    • 84888842651 scopus 로고    scopus 로고
    • Interconnecting federated clouds by using publish-subscribe service
    • Dec
    • C. Esposito, M. Ficco, F. Palmieri, and A. Castiglione, "Interconnecting federated clouds by using publish-subscribe service, " Cluster Comput, vol. 16, no. 4, pp. 887-903, Dec. 2013.
    • (2013) Cluster Comput , vol.16 , Issue.4 , pp. 887-903
    • Esposito, C.1    Ficco, M.2    Palmieri, F.3    Castiglione, A.4
  • 7
    • 80053144966 scopus 로고    scopus 로고
    • Exploiting cloud utility models for profit and ruin
    • J. Idziorek, "Exploiting cloud utility models for profit and ruin, " in Proc. IEEE CLOUD, 2011, pp. 33-40.
    • (2011) Proc IEEE CLOUD , pp. 33-40
    • Idziorek, J.1
  • 8
    • 84875706647 scopus 로고    scopus 로고
    • The insecurity of cloud utility models
    • Mar./Apr
    • J. Idziorek, M. F. Tannian, and D. Jacobson, "The insecurity of cloud utility models, " IEEE IT Prof, vol. 15, no. 2, pp. 22-27, Mar./Apr. 2013.
    • (2013) IEEE IT Prof , vol.15 , Issue.2 , pp. 22-27
    • Idziorek, J.1    Tannian, M.F.2    Jacobson, D.3
  • 9
    • 84882403734 scopus 로고    scopus 로고
    • Security event correlation approach for cloud computing
    • Sep
    • M. Ficco, "Security event correlation approach for cloud computing, " J. High Perform. Comput. Netw, vol. 7, no. 3, pp. 173-185, Sep. 2013.
    • (2013) J. High Perform. Comput. Netw , vol.7 , Issue.3 , pp. 173-185
    • Ficco, M.1
  • 11
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCP-Targeted denial of service attacks and counter strategies
    • Aug
    • A. Kuzmanovic, and E. Knightly, "Low-rate TCP-Targeted denial of service attacks and counter strategies, " Proc. IEEE/ACM TON, vol. 14, no. 4, pp. 683-696, Aug. 2006.
    • (2006) Proc IEEE/ ACM TON , vol.14 , Issue.4 , pp. 683-696
    • Kuzmanovic, A.1    Knightly, E.2
  • 12
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCP-Targeted denial of service attacks: The shrew versus the mice and elephants
    • ACM
    • A. Kuzmanovic, and E. Knightly, "Low-rate TCP-Targeted denial of service attacks: The shrew versus the mice and elephants, " in Proc. Conf. Appl., Technol., ACM, 2003, pp. 75-86.
    • (2003) Proc. Conf. Appl., Technol , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.2
  • 13
  • 15
    • 84939860310 scopus 로고    scopus 로고
    • On a new class of pulsing denial-of-service attacks and the defense
    • X. Luo, and R. K. Chang, "On a new class of pulsing denial-of-service attacks and the defense, " in Proc. Netw. Distrib. Syst. Security Symp., 2005, pp. 61-79.
    • (2005) Proc. Netw. Distrib. Syst. Security Symp , pp. 61-79
    • Luo, X.1    Chang, R.K.2
  • 18
    • 33845714972 scopus 로고    scopus 로고
    • Evaluation of a low-rate dos attack against iterative servers
    • Mar
    • G. Macia-Fernandez, J. E. Daz-Verdejo, and P. Garca-Teodoro, "Evaluation of a low-rate dos attack against iterative servers, " Comput. Netw, vol. 51, no. 4, pp. 1013-1030, Mar. 2007.
    • (2007) Comput. Netw , vol.51 , Issue.4 , pp. 1013-1030
    • Macia-Fernandez, G.1    Daz-Verdejo, J.E.2    Garca-Teodoro, P.3
  • 19
    • 55649105431 scopus 로고    scopus 로고
    • Evaluation of a low-rate DoS attack against application servers
    • Dec
    • G. Macia-Fernandez, J. E. Daz-Verdejo, and P. Garcia-Teodoro, "Evaluation of a low-rate DoS attack against application servers, " Comput. Security, vol. 27, no. 7/8, pp. 335-354, Dec. 2008.
    • (2008) Comput. Security , vol.27 , Issue.7-8 , pp. 335-354
    • Macia-Fernandez, G.1    Daz-Verdejo, J.E.2    Garcia-Teodoro, P.3
  • 20
    • 84938683561 scopus 로고    scopus 로고
    • Adaptive stealth energy-related DoS attacks against cloud data centers
    • F. Palmieri, M. Ficco, and A. Castiglione, "Adaptive stealth energy-related DoS attacks against cloud data centers, " in Proc. 8th Int. Conf. IMIS, 2014, pp. 265-272.
    • (2014) Proc. 8th Int. Conf. IMIS , pp. 265-272
    • Palmieri, F.1    Ficco, M.2    Castiglione, A.3
  • 21
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defense to protect cloud computing against HTTP-DOS and XML-DoS attacks
    • Jul
    • A. Chonka, Y. Xiang, and A. Bonti, "Cloud security defense to protect cloud computing against HTTP-DOS and XML-DoS attacks, " J. Netw. Comput. Appl, vol. 34, no. 4, pp. 1097-1107, Jul. 2011.
    • (2011) J. Netw. Comput. Appl , vol.34 , Issue.4 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Bonti, A.3
  • 22
    • 85027441571 scopus 로고    scopus 로고
    • OpenNebula Archives [Online]. Available
    • OpenNebula Archives, "Oneflow server configuration 4.4." [Online]. Available: http://archives.opennebula.org/documentation:rel4.4:appflow-configure
    • Oneflow Server Configuration 44
  • 23
    • 77955384577 scopus 로고    scopus 로고
    • Real-Time detection of stealthy DDoS attacks using time-series decomposition
    • H. Liu, and M. S. Kim, "Real-Time detection of stealthy DDoS attacks using time-series decomposition, " in Proc. IEEE ICC, 2010, pp. 1-6.
    • (2010) Proc IEEE ICC , pp. 1-6
    • Liu, H.1    Kim, M.S.2
  • 24
    • 77956393826 scopus 로고    scopus 로고
    • Network anomaly detection through nonlinear analysis
    • Oct
    • F. Palmieri, and U. Fiore, "Network anomaly detection through nonlinear analysis, " Comput. Security, vol. 29, no. 7, pp. 737-755, Oct. 2010.
    • (2010) Comput. Security , vol.29 , Issue.7 , pp. 737-755
    • Palmieri, F.1    Fiore, U.2
  • 25
    • 84896297829 scopus 로고    scopus 로고
    • A distributed approach to network anomaly detection based on independent component analysis
    • Apr
    • F. Palmieri, U. Fiore, and A. Castiglione, "A distributed approach to network anomaly detection based on independent component analysis, " Concurrency Comput.: Practice Exp, vol. 25, no. 5, pp. 1113-1129, Apr. 2014.
    • (2014) Concurrency Comput.: Practice Exp , vol.25 , Issue.5 , pp. 1113-1129
    • Palmieri, F.1    Fiore, U.2    Castiglione, A.3
  • 26
    • 77956877779 scopus 로고    scopus 로고
    • Defense techniques for low-rate DoS attacks against application servers
    • Oct
    • G. Macia-Fernandez, R. A. Rodriguez-Gomez, and J. E. Diaz-Verdejo, "Defense techniques for low-rate DoS attacks against application servers, " Comput. Netw, vol. 54, no. 15, pp. 2711-2727, Oct. 2010.
    • (2010) Comput. Netw , vol.54 , Issue.15 , pp. 2711-2727
    • Macia-Fernandez, G.1    Rodriguez-Gomez, R.A.2    Diaz-Verdejo, J.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.