15 Mar
2010
15 Mar
'10
10:02 p.m.
That's right M.Fortaine .. and your model does not, as yet, appear to address what you term as EDoS and what the general security community calls "DDoS" On Tue, Mar 16, 2010 at 7:29 AM, Guillaume FORTAINE <gfortaine@live.com> wrote:
From my point of view, it seems similar to the EDoS concept :
http://www.rationalsurvivability.com/blog/?s=EDos
"EDoS attacks, however, are death by a thousand cuts. EDoS can also utilize distributed attack sources as well as single entities, but works by making legitimate web requests at volumes that may appear to be “normal” but are done so to drive compute, network, and storage utility billings in a cloud model abnormally high."
-- Suresh Ramasubramanian (ops.lists@gmail.com)