Research Area:  Fog Computing
This paper reviews the threat of economic denial of sustainability on recent communication networks and discusses their adaptation to emergent scenarios suited for self-organization and network function virtualization. Thorough the performed research two novel threats were defined: workload-based EDoS (W-EDoS) and Instantiation-based EDoS (I-EDoS). W-EDoS is characterized by executing expensive requests in terms of computational resources at the victim system, hence exhausting its workload and forcing operators to contract additional resources. On the other hand, I-EDoS occurs when the cloud management software deploys more instances of virtual network functions than needed as a response to requests that resemble legitimate, but are malicious, thus increasing the cost of the hired resources. In order to contribute to their mitigation, a security architecture that incorporates network-based intrusion detection capabilities for their recognition is proposed. It implements strategies that lie on predicting the behavior of the protected system, constructing adaptive thresholds, and clustering of instances based on productivity. An extensive experimentation has been conducted to demonstrate the proposal effectiveness, which includes case studies and the accuracy assessment when considering different adjustment parameters. Under the most intense conditions, the highest AUC performed above 98% when assessing the I-EDoS detection accuracy, being the same reading higher than 99% in the case of W-EDoS.
Keywords:  
Author(s) Name:  Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Gregorio Martínez Pérez
Journal name:  Computer Communications
Conferrence name:  
Publisher name:  Elsevier
DOI:  10.1016/j.comcom.2019.07.002
Volume Information:  Volume 145, September 2019, Pages 284-308
Paper Link:   https://www.sciencedirect.com/science/article/abs/pii/S0140366418301695