Analysis of the EDoS attack impact on elastic cloud services using finite queuing model

Suneetha Bulla, B. Basaveswara Rao, K. Gangadhara Rao, K. Chandan


This paper proposes a logical model to examine the effect of the EDoS attack in cloud environment using finite queuing model and enhanced with experimental model. Due to this sophisticated attacks the computing resources are busy and buffer capacity of the cloud gets exhausted by both the legitimate and malicious user requests, because of this both types of requests could not get the service. The legitimate customers are unable to get service of web application. In this backdrop this paper investigates and evaluates the vendor loss factor from the cost factor of view since the legitimate client requests are denied service. The objective of this analysis is twofold i) to identify the dynamics of the EDoS attacks with different attack rates and to measure the various performance metrics (total number of busy virtual machines, utilization of the cloud resources, request response time, request loss probability, and throughput). ii) The cost function is defined and evaluated based on these performance metrics. Finally compared analytical and experimental results are presented and conclusions are drawn.

Full Text:



L. Wu and R. Buyya, “Service Level Agreement (SLA) in Utility Computing Systems”, Technical Report, pp. 1-27, 2010.

Rashmi V (2015) et al. , Understanding DDoS Attack & Its Effect In Cloud Environment, Published by Elsevier, Procedia Computer Science 49 ( 2015 ) 202 – 210.

Hoff, C.: The economic denial of sustainability concept.

Khaled Salah et al. (2015), “An Analytical Model for Estimating Cloud Resources of Elastic Services”: Springer Journal.

F. Al-Haidari, et al. (2015). Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services, (Arab J Sci Eng), Springer.

Suneetha Bulla, B. Basaveswara Rao, et al.: “An experimental evaluation of the impact of the EDoS attacks against cloud computing services using AWS”, International Journal of Engineering & Technology, 7 (1.5) (2018) 202-208.

Khaled Salah,” A Queueing Model to Achieve Proper Elasticity for Cloud Cluster Jobs”, International Journal of Cloud Computing (ISSN 2326-7550),Vol. 1, No. 1, July-September 2013

Gian-Luca Dei Rossi, Mauro Iacono, Andrea Marin : “Evaluating the impact of eDoS attacks to cloud facilities”: VALUETOOLS 2015, December 14-16, Berlin, Germany.

Shi, Y.; Jiang, X.; Ye K.: An energy-efficient scheme for cloud resource provisioning based on cloudSim. In: 2011 IEEE International Conference on Cluster Computing (CLUSTER), Austin, TX, pp. 595–599 (2011)

K. Salah, “Analysis of a Two-Stage Network Server,” International Journal of Applied Mathematics and Computation, Vol. 217, No. 23, 2011, Elsevier Science, pp. 9634-9645., Takagi, 1993.

Amazon web services, auto scaling.

Amazon EC2:

Amazon RDS:

Amazon S3:

Amazon Rote 53:

Catteddu, D.; Hogben, G.: Cloud Computing: benefits, risks and recommendations for information security. Technical Report, European Network and Information Security Agency (2009).

Islam, S.; Lee, K.; Fekete, A.; Liu, A.: How a consumer can measure elasticity for cloud platforms. Technical Report, School of Information Technology, Univercity of Sydeny (2011)

Amazon EC2 Pricing.

P. Mell & T. Grance. “The NIST definition of cloud computing.” 2011.



  • There are currently no refbacks.

Copyright (c) 2019 Suneetha B

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License