Research | Bring Your Own Device
A framework for mitigating the impacts of economical denial of sustainability attacks against the cloud
- To study the security risks which threaten the cloud, specifically the risks resulting from the BYOD concept that create new challenges to the whole security of the cloud.
- To classify the security threats against the cloud, including the threats which are resulting from applying BYOD, into four categories; policy and organisational risks, technical risks, physical security issues, and legal risks.
- To identify the security gap, which is the security issues resulting from implementing BYOD concept in the organisations that adopted the cloud as clients, and the risks which can threaten the cloud security.
- To develop a new method, which can be implemented from procedural and technical perspective in order to protect the cloud environment, including apply the required authentication mechansisms, install software firewalls in the mobile devices, and by applying effective security measures to solve the identified issue which pose a threat to the cloud.
- To evaluate and test the developed method practically to ensure its success, validity, and applicability for accomplish the desired aim.
- To draw a conclusion of the conducted research by presenting the developed framework in order to explain its implementation in the reality, and determine the future work, which is need to be carried out in order to enhance the security of the cloud by mitigating the impacts resulting from applying BYOD concept.
Prof. Khalid Al-Begain and Wael Alosaimi, PhD student
In the cloud era, security has become a renewed source of concern. Distributed Denial of Service (DDoS) and the Economical Denial of Sustainability (EDoS) that can affect the pay-per-use model, which is one of the most valuable benefits of the cloud, can again become very relevant especially with the introduction of new policies in enterprises such as the “Bring Your Own Device” (BYOD).
In this regard, the attacks can exploit the IAM (Identity and Access Management) vulnerabilities in the BYOD implementation in the enterprises which are customers for the cloud. Attackers can gain access to the internal network of an enterprise to generate EDoS attacks against the cloud by exploiting the absence of a unified management of heterogeneous platforms of the devices which are used in the BYOD environment. This can affect the enterprise itself (Direct DDOS) or other enterprises using the cloud service provider (Indirect DDOS).
Therefore, the main aim of the project is to solve this issue by proposing a framework which can be used to encounter DDoS and EDoS attacks against the cloud providers and customers and mitigating their impacts. It involves verifying the users legitimacy at the beginning and then monitoring their behaviour using several methods and components in the cloud customers’ networks which allow Bring Your Own Device (BYOD) trend, in order to provide a secure cloud environment.
How this is new
The novelty of the proposed framework lies in decreasing the end-to-end latency for legitimate users by testing only their first packet and using a layered defence system to provide an ongoing monitoring to the subsequent packets.
- Alosaimi, W., and Al-Begain, K., 2013. A New Method to Mitigate the Impacts of the Economical Denial of Sustainability Attacks Against the Cloud. Proceedings of the 14th Annual Post Graduates Symposium on the convergence of Telecommunication, Networking and Broadcasting (PGNet), pp. 116-121.
- Alosaimi, W., and Al-Begain, K., 2013. An Enhanced Economical Denial of Sustainability Mitigation System for the Cloud. Proceedings of the 7th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST), pp. 19-25.