Fog computing has recently offered benefit able services to Cloud users such as low latency, mobility support, real-time data process, low bandwidth, improved Quality of Service (QoS), and better security. The auto-scaling and measured service characteristics of both Cloud and Fog networks make them vulnerable to cyber-crimes. Consequently, A Economic Denial of Service (EDoS) takes advantage of Cloud users’ vulnerabilities (i.e., software, protocol, IP addresses) to install malware on their device unknowingly. It makes victims captive through a Botnet controller to continuously send unsolicited packets to the data center, which exhausts the Cloud users service subscription (i.e., networking, compute, storage, memory), making the environment financially unsustainable or leading to bankruptcy. “This paper presents EDoS attack challenges and defense approach using Fog network.
Keywords: Cloud Computing, DDoS, EDoS, Fog Network computing, Fog computing