DoWTS – Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence

Author:

Kelly Daniel,Glavin Frank G,Barrett Enda

Abstract

AbstractThe intentional targeting of components in a cloud based application, in order to artificially inflate usage bills, is an issue application owners have faced for many years. This has occurred under many guises, such as: Economic Denial of Sustainability (EDoS), Click Fraud and even secondary effects of Denial of Service (DoS) attacks. With the advent of commercial offerings of serverless computing circa 2015, a variant of the EDoS attack has emerged, termed, Denial-of-Wallet (DoW). We describe our development of a simulation tool as safe means to research these attacks as well as to generate datasets for the training of future mitigation systems to combat DoW. We believe that DoW may become increasingly prevalent as applications further utilise services based on a pay-per-invocation cost model. Given that the damage caused is purely financial, such attacks may not be disclosed as application users are not directly effected. As such, we believe that the development of an attack simulator and specific testing of security measures against this niche attack will be able to provide previously unavailable data and insights for the research community. We have developed a prototype DoW simulator that can emulate multiple months worth of API calls in a matter of hours for ease of training data generation. Our aspiration for the future of this work is to provide a system and starting point for research on this form of attack. We present our work on such a system Denial-of-Wallet Test Simulator (DoWTS) - a system that allows for safe testing of theorised DoW attacks against serverless applications via synthetic data generation. We also expand upon prior research on DoW and provide an analysis on the lack of specific safety measures for DoW.

Publisher

Springer Science and Business Media LLC

Subject

Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Information Systems,Software

Reference37 articles.

1. Ana (2017) Bot baseline fraud in digital advertising 2016-2017. Report. https://www.ana.net/getfile/25093. Accessed 31 Jan 2022

2. AWS (2017) Wild Rydes. https://aws.amazon.com/getting-started/hands-on/build-serverless-web-app-lambda-apigateway-s3-dynamodb-cognito/

3. AWS (2019) Serverless applications lens aws well-architected framework. Report. Accessed 7 Feb 2022

4. AWS (2021) Security overview of aws lambda. Report

5. Barna, C., Mark, S., Michael, S., Vassilios, T., Marin, L. (2012) Model-based adaptive dos attack mitigation. IEEE

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A comprehensive survey on social engineering-based attacks on social networks;International Journal of ADVANCED AND APPLIED SCIENCES;2024-04

2. Generation of a dataset for DoW attack detection in serverless architectures;Data in Brief;2024-02

3. Opportunities for synthetic data in nature and climate finance;Frontiers in Artificial Intelligence;2024-01-09

4. Evidence-based adaptive oversampling algorithm for imbalanced classification;Knowledge and Information Systems;2023-09-23

5. Editorial: AI meets cybersecurity;Journal of Intelligent Information Systems;2022-12-02

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3