Join the Webinar | Strong Protection Against Cyber Threats

What is an EDoS Attack?

Economic Denial of Sustainability is a cyber security threat targeting EDOS Cloud environments. EDoS Attacks are attacks aimed at depleting the budgets of companies using Cloud services until the server is suspended. These attacks take advantage of the automatic growth of cloud servers, causing the server owner to face a bill that they did not take into account.

What Causes EDoS Attack?

Cloud Technologies are preferred by many companies. Companies that want to use cloud technology want to use this technology by contacting various service providers according to their needs.

For various reasons, the requirements of purchased servers increase, and service providers see these requirements increase and automatically add more powerful processors, higher capacity RAM and more disk space to the server. Naturally, these demands increase costs. The attack is successful when the increased costs exceed the budget allocated to the service provider.

How Does an EDoS Attack Work?

If the resource usage of the company using cloud technology is flexible (resource allocation is made according to the current status of the server) and the budget allocation is made according to this flexibility, this may cause the invoices to increase.

EDoS Attack aims to consume the budget allocated to the cloud system and to have the service provider suspend the server due to the consumed budget. Dos/DDoS Attacks are carried out on the target server, causing the server to use more resources. The server that uses more resources quickly consumes the budget allocated to the service provider, and the service provider suspends the server when the budget is exhausted.

How to Protect from EDoS Attacks?

The most logical way to protect yourself from EDoS Attacks is to directly avoid DoS/DDoS Attacks.

  • By using CAPTCHA and similar applications, it can be checked whether the incoming traffic is a bot or not.
  • It can be determined whether there is a Dos/DDoS Attack by examining the Incoming Traffic.
  • How much resources your Service Provider and Servers consume should be monitored in real time and intervention should be made quickly in unexpected situations.
  • The budget you allocate to your service provider should be adjusted by taking into account the server's request for more resources.


Categories Articles