Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Douglas Jacobson is active.

Publication


Featured researches published by Douglas Jacobson.


cloud computing security workshop | 2011

Detecting fraudulent use of cloud resources

Joseph Idziorek; Mark Tannian; Douglas Jacobson

Initial threat modeling and security research on the public cloud model has primarily focused on the confidentiality and integrity of data transferred, processed, and stored in the cloud. Little attention has been paid to the external threat sources that have the capability to affect the financial viability, hence the long-term availability, of services hosted in the public cloud. Similar to an application-layer DDoS attack, a Fraudulent Resource Consumption (FRC) attack is a much more subtle attack carried out over a longer duration of time. The objective of the attacker is to exploit the utility pricing model which governs the resource usage in the cloud model by fraudulently consuming web content with the purpose of depriving the victim of their long-term economic availability of hosting publicly accessible web content in the cloud. In this paper, we thoroughly describe the FRC attack and discuss why current application-layer DDoS detection schemes are not applicable to a more subtle attack. We propose three detection metrics that together form the criteria for identifying a FRC attack from that of normal web activity. Experimental results based on three plausible attack scenarios show that an attacker without knowledge of the web log has a difficult time mimicking the self-similar and consistent request semantics of normal web activity.


It Professional | 2013

The Insecurity of Cloud Utility Models

Joseph Idziorek; Mark Tannian; Douglas Jacobson

Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumers financial burden.


international conference on cloud computing | 2012

Attribution of Fraudulent Resource Consumption in the Cloud

Joseph Idziorek; Mark Tannian; Douglas Jacobson

Obligated by a utility pricing model, Internet-facing web resources hosted in the public cloud are vulnerable to Fraudulent Resource Consumption (FRC) attacks. Unlike an application-layer DDoS attack that consumes resources with the goal of disrupting short-term availability, an FRC attack is a considerably more subtle attack that instead seeks to disrupt the long-term financial viability of operating in the cloud by exploiting the utility pricing model over an extended time period. By fraudulently consuming web resources in sufficient volume (i.e. data transferred out of the cloud), an attacker (e.g. botnet) is able to incur significant fraudulent charges to the victim. This paper proposes an attribution methodology to identify malicious clients participating in an FRC attack. Experimental results demonstrate that the presented methodology achieves qualified success against challenging attack scenarios.


winter simulation conference | 2011

Modeling web usage profiles of cloud services for utility cost analysis

Joseph Idziorek; Mark Tannian; Douglas Jacobson

Early proponents of public cloud computing have come to identify cost savings a key factor for adoption. However, the adoption and hosting of a web application in the cloud does not provide any such guarantees. This is in part due to the utility pricing model that dictates the cost of public cloud resources. In this work we seek to model and simulate data usage for a web application for the purpose of utility cost analysis. Although much research has been performed in the area of web usage mining, previously proposed models are unable to accurately model web usage profiles for a specific web application. In this paper, we present a simulation model and corresponding algorithm to model web usage based on empirical observations. The validation of the proposed model shows that the simulated output conforms to that of what was observed and is within acceptable tolerance limits.


Archive | 1997

Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections

Douglas Jacobson; James A. Davis


Archive | 1996

Network security bridge and associated method

Douglas Jacobson


Archive | 2017

Computer Security Literacy: Staying Safe in a Digital World

Douglas Jacobson; Joseph Idziorek


2013 ASEE Annual Conference & Exposition | 2013

Implementation and Results of a Revised ABET Assessment Process

Diane T. Rover; Douglas Jacobson; Ahmed E. Kamal; Akhilesh Tyagi


2011 ASEE Annual Conference & Exposition | 2011

Teaching Computer Security Literacy to Students from Non-Computing Disciplines

Joseph Idziorek; Mark Tannian; Douglas Jacobson


frontiers in education conference | 2017

Cyber security training a survey of serious games in cyber security

Jin-Ning Tioh; Mani Mina; Douglas Jacobson

Collaboration


Dive into the Douglas Jacobson's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mani Mina

Iowa State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge