Ве молиме користете го овој идентификатор да го цитирате или поврзете овој запис: http://hdl.handle.net/20.500.12188/27647
DC FieldValueLanguage
dc.contributor.authorMileski, Dimitaren_US
dc.contributor.authorMihajloska, Hristinaen_US
dc.date.accessioned2023-09-01T08:31:39Z-
dc.date.available2023-09-01T08:31:39Z-
dc.date.issued2022-11-15-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/27647-
dc.description.abstractThe serverless pay-as-you-go model in the cloud enables payment of services during execution and resources used at the smallest, most granular level, as was the initial idea when setting the foundations and concepts of the pay-as-you-go model in the cloud. The disadvantage of this method of payment during execution and the resources used is that it is subject to financial damage if we have an attack on serverless services. This paper defines notions for three types of attacks that can cause financial damage to the serverless pay-as-you-go model and are experimentally validated. The first attack is Blast DDoW - Distributed Denial of Wallet, the second attack is Continual Inconspicuous DDoW, and the third one is Background Chained DDoW. We discussed financial damages and the consequences of each type of attack.en_US
dc.publisherIEEEen_US
dc.subjectdistributed denial of wallet, serverless, FaaS, DDoS, pay as you go modelen_US
dc.titleDistributed Denial of Wallet Attack on Serverless Pay-as-you-go Modelen_US
dc.typeProceeding articleen_US
dc.relation.conference2022 30th Telecommunications Forum (TELFOR)en_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Прикажи едноставен запис

Page view(s)

72
checked on 3.5.2025

Download(s)

69
checked on 3.5.2025

Google ScholarTM

Проверете


Записите во DSpace се заштитени со авторски права, со сите права задржани, освен ако не е поинаку наведено.