STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING
Authors:
Gara Vamsi Krishna, Dr.V. Bhaskar Murthy
Page No: 625-631
Abstract:
The widespread adoption of Cloud Computing is largely attributed to its on-demand access, self-service capabilities, and pay-per-use model. However, this model also introduces new vulnerabilities—particularly to Denial of Service (DoS) attacks—which not only degrade service quality but also increase resource usage costs. The longer it takes to detect such attacks, the higher the financial burden. Stealthy DoS attacks are especially concerning, as they are designed to avoid detection while still being as disruptive as brute-force attacks. These attacks exploit the system’s worst-case performance using carefully crafted traffic patterns—periodic, pulsing, or low-rate. In this paper, we propose a strategy to engineer stealthy DoS attack patterns that gradually increase in intensity. These patterns aim to maximize financial impact on cloud customers, all while staying within the limits enforced by detection systems regarding job size and service request rate. We detail the implementation of this strategy and analyze its impact on a cloud-based target system.
Description:
.
Volume & Issue
Volume-14,Issue-4
Keywords
Index Terms— Cloud Computing, stealthy attacks, low-rate DoS, intrusion detection, cost-based impact.