Computer Science and Information Technologies, Computer Science and Information Technologies 2012

Font Size: 
Implementing а distributed attack such as “Denial of service” based on cloud computing
М. Y. Kosenko, A. V. Melnikov

Last modified: 2021-04-15


Amongst various online attacks hampering JT security, Denial of Service has the most devastating effects. These attacks could be implemented diversely with с variety of tools and codes. This article represents implementing а Distributed attack such as “denial of service" based on cloud computing А comparison of the classical model of DDoS attacks and the attack model of clouds. In order to implement an attack using Amazon ЕС2. The author uses the technique of "Slow HTTP POST" tor the attack.


DDoS attacks; HTTP; cloud computing


1. “The NIST Definition of Cloud Computing (Draft)”. NIST Special Publication 800-145

2. David Bryan, Michael Anderson, “Cloud Computing а Weapon of Mass Distruction”, Defcon 18.

3. Kosenko М. “Abuse of cloud computing” / Information Technologies and Systems (ITS’2012), Vol 1. CSU, Chelyabinsk, Russia, 2012, pp. 67-69.

Full Text: PDF