Distributed Denial of Wallet Attack on Serverless Pay-as-you-go Model

Nov. 16, 2022

📄 ACCEPTED VERSION PDF

🔗 DOI: 10.1109/TELFOR56187.2022.9983732

🔗 PUBILISHED VERSION

ABSTRACT:

The serverless pay-as-you-go model in the cloud enables payment of services during execution and resources used at the smallest, most granular level, as was the initial idea when setting the foundations and concepts of the pay-as-you-go model in the cloud. The disadvantage of this method of payment during execution and the resources used is that it is subject to financial damage if we have an attack on serverless services. This paper defines notions for three types of attacks that can cause financial damage to the serverless pay-as-you-go model and are experimentally validated. The first attack is Blast DDoW - Distributed Denial of Wallet, the second attack is Continual Inconspicuous DDoW, and the third one is Background Chained DDoW. We discussed financial damages and the consequences of each type of attack.

PUBLISHED IN:

🔗 2022 30th Telecommunications Forum (TELFOR)

NOTICE:

© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.