Article Preview
Top1. Introduction
These days society’s reliance on information technology has increased by large extent and cloud computing is an environment which fulfill this huge demand of resources in a cost efficient way. In Cloud Computing resources are provided as services to the users on pay-per-use model (www.arbornetworks.com) (Bhandari, 2013).
When DDoS attack is implemented in Cloud Computing environment it leads to another attack known as Economical-Denial-Of-Sustainability (EDoS). This attack exploits the dynamic scalability property of cloud (Metz, 2009). In EDoS, attacker uses the provisioned resources of the user and dynamically scale it by using the resources for invalid request generated by zombie machines. This results in raising the cost for the user and decrementing the profit and trust of the service provider thus affecting the sustainability of CSP as shown in Figure 1.
Figure 1. Effect of an EDoS Attack against the cloud
In EDoS the users are charged for resources which they don’t even use (Robinson, 2005). The firms chosen for cloud will experience an overstated bills for using auto scaling feature to address an overflow of malicious traffic in order to meet the necessity to clear SLA.
A service level agreement (SLA) is an article which describes the connection among two parties: the provider and the receiver (Kandukuri, Reddy, Ramakrishna & Rakshit, 2009).
This is undoubtedly a very significant element of certification for both parties. If used correctly it must:
- •
Classify and describe the customer’s requirements.
- •
Deliver a framework for understanding.
- •
Shorten composite matters.
- •
Decrease parts of struggle.
- •
Inspire discussion in the event of arguments.
- •
Remove impractical prospects.