Exploiting cloud utility models for profit and ruin

dc.contributor.advisor Doug Jacobson
dc.contributor.author Idziorek, Joseph
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2018-08-11T07:05:37.000
dc.date.accessioned 2020-06-30T02:42:04Z
dc.date.available 2020-06-30T02:42:04Z
dc.date.copyright Sun Jan 01 00:00:00 UTC 2012
dc.date.embargo 2014-10-31
dc.date.issued 2012-01-01
dc.description.abstract <p>A key characteristic that has led to the early adoption of public cloud computing is the utility pricing model that governs the cost of compute resources consumed. Similar to public utilities like gas and electricity, cloud consumers only pay for the resources they consume and only for the time they are utilized. As a result and pursuant to a Cloud Service Provider's (CSP) Terms of Agreement, cloud consumers are responsible for all computational costs incurred within and in support of their rented computing environments whether these resources were consumed in good faith or not. While initial threat modeling and security research on the public cloud model has primarily focused on the confidentiality and integrity of data transferred, processed, and stored in the cloud, little attention has been paid to the external threat sources that have the capability to affect the financial viability of cloud-hosted services.</p> <p>Bounded by a utility pricing model, Internet-facing web resources hosted in the cloud are vulnerable to Fraudulent Resource Consumption (FRC) attacks. Unlike an application-layer DDoS attack that consumes resources with the goal of disrupting short-term availability, a FRC attack is a considerably more subtle attack that instead targets the utility model over an extended time period. By fraudulently consuming web resources in sufficient volume (i.e. data transferred out of the cloud), an attacker is able to inflict significant fraudulent charges to the victim. This work introduces and thoroughly describes the FRC attack and discusses why current application-layer DDoS mitigation schemes are not applicable to a more subtle attack. The work goes on to propose three detection metrics that together form the criteria for detecting a FRC attack from that of normal web activity and an attribution methodology capable of accurately identifying FRC attack clients. Experimental results based on plausible and challenging attack scenarios show that an attacker, without knowledge of the training web log, has a difficult time mimicking the self-similar and consistent request semantics of normal web activity necessary to carryout a successful FRC attack.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/12349/
dc.identifier.articleid 3356
dc.identifier.contextkey 3437714
dc.identifier.doi https://doi.org/10.31274/etd-180810-1240
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/12349
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/26538
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/12349/Idziorek_iastate_0097E_12515.pdf|||Fri Jan 14 19:19:19 UTC 2022
dc.subject.disciplines Computer Engineering
dc.subject.keywords anomaly detection
dc.subject.keywords application-layer DDoS
dc.subject.keywords cloud computing
dc.subject.keywords fraudulent resource consumption
dc.subject.keywords security
dc.subject.keywords utility pricing model
dc.title Exploiting cloud utility models for profit and ruin
dc.type dissertation
dc.type.genre dissertation
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.level dissertation
thesis.degree.name Doctor of Philosophy
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Idziorek_iastate_0097E_12515.pdf
Size:
4.44 MB
Format:
Adobe Portable Document Format
Description: