Securing Cloud Servers Against Flooding Based Ddos Attacks
Securing Cloud Servers Against Flooding Based Ddos Attacks
Securing Cloud Servers Against Flooding Based Ddos Attacks
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com Volume 1, Issue 3, November 2012 ISSN 2319 - 4847
Department of Computer Engineering, NCET, Nagpur University. Department of Computer Technology, YCCE, Nagpur University. Department of Computer Technology, YCCE, Nagpur University.
ABSTRACT
Cloud computing is still a juvenile and most dynamic field characterized by a buzzing IT industry. Virtually every industry and even some parts of the public sector are taking on cloud computing today, either as a provider or as a consumer. Despite being young it has not been kept untouched by hackers, criminals and other bad guys to break into the web servers. Once weakened these web servers can serve as a launching point for conducting further attacks against users in the cloud. One such attack is the DoS or its version DDoS attack. This paper presents a simple distance estimation based technique to detect and prevent the cloud from flooding based DDoS attack and thereby protect other servers and users from its adverse effects.
1. INTRODUCTION
Cloud Computing is a catchword in todays IT industry that nobody can escape. Cloud computing uses modern web and virtualization to dynamically provide various kinds of electronically provisioned services. In the last few years it has come into focus in the current IT industry and has served as a way to increase capacity or add new services without investing in new infrastructures, training new personnel, or licensing new software. It incorporates any paid or subscription based services over the Internet, extending existing capabilities of the IT industry. Moreover these services are available in reliable and scalable form to multiple consumers, whenever required. Other major advantage of cloud computing is, that it hides the complexity of IT technology from front end users and to some extent, developers. Number of different definitions of cloud has been proposed in the literature; however most of the definitions include some common features such as scalability, on-demand, pay-as-you-go, self-configuration, self maintenance and Software as a Service. Some of the definitions are listed below: A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. - Foster et al. [1] Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. - National Institute of Standards and Technology (NIST) [2] Cloud computing and virtualization can be abridged into a four layered model architecture as in Figure 1 [3]. Hardware - It refers to the highly capable computing and networking equipment, which includes efficient processing engines, storage solutions, networks, faster and larger memories. Infrastructure as a Service (IaaS) - In order to serve larger number of users with limited resources, a suitable allocation scheme is necessary. Infrastructure refers to the operating system and its virtualization. Different users will be allocated with dedicated CPU and memory virtually depending upon their accountability. Platform as a Service (PaaS) - It refers to the programming models, execution method and programming language environment, database, and web server. This can include aspects such as development, administration, management tools, run-time and data management engines along with security and user management services Software as a Service (SaaS) - This is most important from users perspective. In this model, cloud providers install and operate application softwares in the cloud. The cloud users can access these softwares from cloud clients and do not directly access the cloud infrastructure and platform on which the application is running i.e., the users here would be accessing the software online and storing the data back in the cloud eliminating the need of installing the application on the cloud user's own computers. This feature provides simplified maintenance and support for different levels of user accountability [2].
Page 50
Figure 1 Cloud Layered Model. The defined cloud by NIST (National Institute of Standards and Technology) has three main deployment models and a fourth one which is the composition of others [2]. When a single organization operates the cloud infrastructure, the private cloud deployment model is used. The infrastructure in this deployment model can be administrated locally or by third parties, also resources may exist on premise or off premise. When several organizations, with similar goals, operate the cloud infrastructure, the community cloud model is used. Administration and resource location can be handled locally or by any third party. The third deployment model is the public cloud. The cloud infrastructure in this deployment model is available to the public. The responsible organization may provide variety of cloud services using the public cloud model. Hybrid cloud is a composition of several deployment models that supports the application portability. 1.1 DoS / DDoS Attack A Denial of Service (DoS) attack is a type of attack focused on disrupting availability. Such an attack can take many shapes, ranging from an attack on the physical IT environment to the overloading of network connection capacity, or through exploiting applications weaknesses. A DoS attack involves, using one computer or internet connection to flood a server with packets (TCP/UDP). The objective of this attack is to overload the servers bandwidth, and other resources, so that anyone who may be trying to get access to the server is not served, hence the term denial of service.
Figure 2: General architecture of DDoS attacks A DDoS (Distributed Denial of Service) attack is almost the same as a DoS attack, but the results of the DDoS attacks are massively destructive. As the name suggests, the DDoS attack is executed using a distributed computing method often called a botnet army, the creation process of which involves infecting computers with a form of malware that gives the botnet owner access to the computer. This could be anything from simply using the computers connection to attack on the service or all the way to gain complete control over the computer. One may aggregate the army together with hundreds or thousands or even more to attack the server so much that it has no choice but to shut down from the overload of bandwidth, RAM and CPU power. Therefore, it is much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion.
Page 51
Page 52
d t 1 d t w ( M t d t )
Here, dt is a distance value at time t predicted at time t-1, Mt is the measured distance value at time t, w is a smoothing gain, and Mt dtistheerrorinthatpredictionattimet.Ifwishigher,thelastpredictionerrorhasthemoreweightin predicting the next distance value. As a result, the predicted values represent the actual distance value fluctuation more closely. To determine whether the current distance value is abnormal or not, mean absolute deviation (MAD) can be utilized:
Page 53
Where, n is the number of all past errors and et is the prediction error at time t. However, it is not realistic to maintain all the past errors. Therefore, we use the exponential smoothing technique to calculate MAD based on the approximation equation as defined below:
MADt 1 r | et | (1 r ) MADt
where, MADt is the MAD value at time t. r is a smoothing gain. If the real value at the next moment is out of the legal scope, an anomaly situation is detected. The above algorithm is implemented using NS-2 simulator and we have considered a situation with 100 nodes in the cloud as in figure 2, where * represents the edge router having direct 200Mbps link and + indicate the wireless cloud nodes. A number of CBR flows try to overwhelm the Web servers as attack traffic.
4. CONCLUSION
In this paper, we have used a distance-based DDoS technique which uses a simple but effective exponential smoothing technique to predict the mean value of distance in the next time period. The proposed technique relies on MMSE to support efficient traffic arrival rate prediction for separated traffic. We tested the technique in the Internet-like network implemented on NS2 with over 100 nodes. The experimental results show that the proposed technique is effective and can detect DDoS attacks with high detection rate and low false positive rate.
Page 54
Page 55