Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ University of Galway...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
University of Galway Research Repository
Doctoral thesis . 2023
License: CC BY NC ND
https://dx.doi.org/10.13025/17...
Doctoral thesis . 2023
Data sources: Datacite
versions View all 2 versions
addClaim

Denial of Wallet: Analysis of a looming threat and novel solution for mitigation using image classification

Authors: Kelly, Daniel;

Denial of Wallet: Analysis of a looming threat and novel solution for mitigation using image classification

Abstract

Serverless Computing is a powerful cloud-based architecture for the creation of applications. It boasts incredible scalability by running processes on a vast network of edge nodes. It decreases the time to deployment, as the developer no longer needs to programme a traditional server-side back-end, only having to focus on the application’s business logic. Serverless applications are billed by counting the number of invocations a function receives in conjunction with its memory allocation. This means that there is no need to pay for the provision of a server that constantly runs in the background when it may only receive a small number of requests per month. These unique selling points, when used in the intended way, can drastically reduce operational costs. However, it has given rise to a potential form of cyber attack that specifically seeks to cause inflated usage bills through the abuse of serverless functions. This attack is called Denial of Wallet (DoW). This thesis presents the first in depth investigation in academia on DoW, comprising the formal definition of the attack, theorised attack vectors, a means of safely recreating attacks for research purposes via synthetic data generation, and a novel detection strategy utilising image classification that yields a detection accuracy of 97.98%

Country
Ireland
Related Organizations
Keywords

Computer Science, Science and Engineering, Information technology, Denial of Wallet (DoW), image classification

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green