Academia.eduAcademia.edu

Cloud-based DDoS attacks and defenses

Safet y and reliabilit y are important in the cloud computing environment. This is especiall y true toda y as distributed denial-of-service (DDoS) attacks constitute one of the largest threats faced b y Internet users and cloud computing services. DDoS attacks target the resources of these services, lowering their abilit y to provide optimum usage of the network infrastructure. Due to the nature of cloud computing, the methodologies for preventing or stopping DDoS attacks are quite different compared to those used in traditional networks. In this paper, we investigate the effect of DDoS attacks on cloud resources and recommend practical defense mechanisms against different t y pes of DDoS attacks in the cloud environment.

Cloud-based DDoS Attacks and Defenses Marwan Darwish, Abdelkader Ouda, Luiz Fernando Capretz Department of Electrical and Computer Engineering University of Western Ontario London, Canada {mdarwis3, aouda, lcapretz}@uwo.ca Abstract Safety and reliability are important in the cloud computing environment. This is especially true today as distributed denial-of-service (DDoS) attacks constitute one of the largest threats faced by Internet users and cloud computing services. DDoS attacks target the resources of these services, lowering their ability to provide optimum usage of the network infrastructure. Due to the nature of cloud computing, the methodologies for preventing or stopping DDoS attacks are quite different compared to those used in traditional networks. In this paper, we investigate the effect of DDoS attacks on cloud resources and recommend practical defense mechanisms against different types of DDoS attacks in the cloud environment. - Keywords: vulnerabilities. cloud computing; network; securiy; DDoS; DDoS attacks are major security risks in a cloud computing environment, where resources are shared by many users. A DDoS attack targets resources or services in an attempt to render them unavailable by looding system resources with heavy amounts of unreal trafic. The objective of DDoS attacks is to consume resources, such as memory, CPU processing space, or network bandwidth, in an attempt to make them unreachable to end users by blocking network communication or denying access to services. Dealing with DDoS attacks at all layers in cloud systems is a major challenge due to the dificulty of distinguishing the attacker's requests rom legitimate user requests, even though the former come rom a large number of disributed machines. In this paper, we present an in-depth analysis of DDoS attacks in cloud computing and discuss the challenges in I. Cloud computing INTRODUCTION is the utilization defending against these attacks. Section 2 provides an overview of hardware and sotware combined to provide services to end users over a network like the intenet. It includes a set of virtual machines that simulate physical computers and provide services, such as operating systems and applications. However, coniguring of DDoS attacks. Section 3 examines the effects of different types of DDoS attack and the recommended defense mechanisms for each type. Section 4 summarizes the results of investigations on DDoS attacks in the cloud system. Finally, Section 5 presents a brief summary of the paper. virtualization in a cloud computing environment is critical when deploying a cloud computing system. A cloud computing structure relies on three service layers: Inrastructure as a Service (IaaS), Platform as a Service (PaaS), and Sotware as a Service (SaaS) (Fig. 1). IaaS gives users access to physical resources, networks, bandwidth, and storage. PaaS builds on IaaS and gives end users access to the operating systems and platforms necessary to build and develop applications, such as databases. SaaS provides end users with access to sotware applications. II. DDoS OVERVIEW DDoS attacks have become more sophisticated. Many websites and large companies are targeted by these types of attacks. The irst DDoS attack was reported in 1999 [1]. In 2000, large resource companies, such as Yahoo, Amazon, CNN.com and eBay, were targeted by DDoS attacks, and their services were stopped for hours [2]. Register.com was targeted by a DDoS in 2001; this was the irst DDoS attack to use DNS servers as relectors [3]. In 2002, service disruption was reported at 9 of 13 DNS root servers due to DNS backbone DDoS attacks. This attack recurred in 2007 and disrupted two DNS root servers. In 2003, Microsot was targeted by Wom Blaster. One million computers were attacked by MyDoom in 2004. In 2007, a DDoS attack was caried out by thousands of computers, targeting more than 10,000 online game servers. In 2008, a DDoS attack targeting Wordpress.com caused 15 minutes of denial [4]. In 2009, GoGrid, a cloud computing provider, was targeted by a large DDoS attack, affecting approximately half of its thousands of customers. In 2009, Register.com was affected again by a DDoS attack. In the same year, some social networking sites, including Facebook and Twitter, were targeted by a DDoS. Many websites were Figure 1. Cloud Computing Architecture attacked by DDoS in 2010, including the Australian Prliament House website, Optus, Web24, Vocus, and Burma's main Intenet provider. In 2011, Visa, MasterCard, PayPal, and 978-1-908320-13/1/$25.00©2013 IEEE 67 PostFinance were targeted by a DDoS that aimed to support the number of hops depending on the value of the Time to Live WikiLeaks founder [4]. In the same year, the site of the (TTL) ield in the IP header. IP-to-hop-count (IP2HC) mapping National Election Commission of South Korea was targeted by is built to detect the spoofed packet. An analysis concluded by DDoS attacks. Furthermore, thousands of infected computers Wang et al. [5] indicated that 90% of spoofed addresses can be participated in a DDoS attack that targeted the Asian E­ detected using the HCF method. One drawback of this method Commerce Company in 2011 [4]. In 2012, the oficial website is that attackers can build their own IP2HC mapping to avoid of the oice of the vice-president of Russia was unavailable for HCF. A rust-based approach to detect spoofed IP addresses 15 hours due to a DDoS attack [4]. In the same year, many can be used in the access routers on the laaS layer [6], but South Korean and United States (US) websites were targeted another compatible solution should be proposed to detect IP by a DDoS. Godaddy.com websites reported service outages spooing in disribution routers. because of such an attack. In 2012, major US banks and fmancial institutions became the target of a DDoS attack. DDoS attacks are evolving rapidly and are targeting large companies, which cause huge fmancial losses to those companies and websites globally. Consequently, investigating DDoS attacks in the cloud system is vital along S with recommending mechanisms to mitigate such attacks. III. Atacker (196.15.10.5) DDoS ATTACKS AND DEFENSES DDoS attacks affect all layers of the cloud system (laaS, Figure 2. TP spooing atack PaaS, and SaaS) and can occur intenally or extenally. An extenal cloud-based DDoS attack starts rom outside the cloud environment and targets cloud-based services. This type of Server (123.12.1.1) B. SYN looding attack attack affects the availability of services. The most affected A Transmission Control Protocol (TCP) connection starts layers in the cloud system by an extenal DDoS attack are the with a three-way handshake, as shown in Fig. 3(a). A typical SaaS and PaaS layers. An intenal cloud-based DDoS attack three-way handshake between a legitimate user and the server occurs within the cloud system, primarily in the PaaS and laaS begins by sending a connection request rom the legitimate user layers, and can occur in several ways. For example, the to the server in the form of a synchronization (SYN) message. attackers may take advantage of the trial periods of cloud Then, the server acknowledges the SYN by sending back services of some vendors. As a result, an authorized user within (SYN-ACK) a request to the legitimate user. Finally, the the cloud environment can launch a DoS attack on the victim's legitimate user sends an ACK request to the server to establish machine intenally. On the other hand, sharing infected virtual the connection. SYN looding occurs when the attacker sends a machine images could allow an attacker to control and use the huge number of packets to the server but does not complete the infected virtual machines to cary out an intenal DDoS attack process of the three-way handshake. As a result, the server on the targeted machine within the same cloud computing waits to complete the process for all of those packets, which system. attacks. makes the server unable to process legitimate requests, as Descriptions of those attacks and recommended practical A DDoS includes different types of shown in Fig. 3(b). Also, SYN looding can be crried out by defense mechanisms in the cloud system are presented in the sending packets with a spoofed IP address. A snifing attack is following sections. considered a type of SYN looding attack. In a sniffmg attack, the attacker sends a packet with the predicted sequence number A. of an active TCP connection with a spoofed IP address. Thus, IP spoofing attack In the Intenet Protocol (lP) spooing attack, packet transmissions between the end user and the cloud server can be the server is unable to reply to that request, which affects the resource performance of the cloud system. intercepted and their headers modiied such that the IP source ield in the IP packet is forged by either a legitimate IP address, as shown in Fig. 2, or by an unreachable IP address. As a result, the server will respond to the legitimate user machine, which affects the legitimate user machine, or the server will be unable to complete the ransaction to the unreachable IP address, which affects the server resources. Tracing such an attack is dificult due to the fake IP address of the IP source ield in the IP packet. The methods for detecting an IP spoofmg attack can be applied in the PaaS layer or in the network resources on the laaS layer. Due to the dificulty of modiYing and upgrading different types of network resources in the cloud system, hop-count iltering (HCF) [5] can be used to distinguish legitimate IPs rom spoofed IPs in the PaaS layer. The HCF counts the 978-1-908320-13/1/$25.00©2013 IEEE Figure 3. SYN looding ttack 68 Many defense mechanisms against SN looding attack can be used in the PaaS and IaaS layers [7]. The SN cache �+-1 approach [8], which establishes a connection with a legitimate request, can be considered in the PaaS layer, but this causes an increase in latency by 15%. The SN cookies defense ' , mechanism [8] is another recommended defense mechanism in the PaaS layer to detect a SN looding attack, but it lowers the performance of the cloud system. Reducing the time of the " , " / , , ,' / " / / .. / / / " / / , / ../ , / ' / / , , / _ _ , _ / ' defense measure, but legitimate ACK packets could be lost. & Moreover, some detection mechanisms, including iltering, (196.15.10.5) SN received to degrade the timeout is a recommended PaaS � (123.12.1.1) Attacker Irewall, and active monitoring, can be used in the IaaS layer. Filtering is an effective method to prevent a SN looding � � . attack by conIguring intenal and extenal router interfaces, but this method is not reliable due to its limited use. The �- (210.21.1.5) Irewall mechanism in the IaaS layer depends on splitting the / -- - / .. "/ / / -- " � � - (123.12.1.252) - - -- -_ _ - � (123.12.1.254) -_ -- �W -_ TCP connection, but this could affect the performance of the (123.12.1.253) networking system. An active monitoring mechanism [9] can Figure 4. be used in the IaaS layer to monitor rafIc of the TCP/IP and react in cases of SN looding. However, this approach depends on the SN cookies mechanism, which leads to decreased performance of cloud resources. . In a smurf attack, the attacker sends a large number of These requests are spoofed such that its source IP address is the victim's IP, and the IP destination address is the broadcast IP address, as shown in Fig. 4. As a result, the victim will be looded with broadcasted addresses. The worst case occurs when the number of hosts who reply to the ICMP echo requests is too large. Preventing this type of attack is diIcult, but it can recommended by two defense different mechanism mechanisms. in the The IaaS fust layer is conIguring the routers to disable the IP-directed broadcast command; The fust mechanism is preventing such vulnerability when writing the source code [11]; however, time consumption is a recommended defense mechanism; this consists of checking Smurf attack mitigated this is disabled by default in curent routers. However, the attacker could use the compromised device in the cloud system as an intemediary to send ICMP echo requests to the broadcast IP address locally, thereby carrying out an intenal cloud-based DoS attack. ConIguring the router in the IaaS layer cannot prevent a smurf attack. Consequently, a the memory access and compiler and using safety language. The third defense mechanism is runtime insrumentation, which can either modiy the retun address to detect the vulnerability or estimate the buffer bounds then perfom a check of the runtime bounds. The fourth recommended defense mechanism in the SaaS layer is analyzing the static and dynamic code to detect application vulnerability in this layer. E. Ping ofdeath attack In the ping of death attack, the attacker sends an IP packet with a size larger than the limit of the IP protocol, which is 65,535 bytes, as shown in Fig. 5. Handling an oversized packet affects the victim's machine within the cloud system as well as the resources of the cloud system. Recent network resources and operating systems disregard any IP packets larger than 65,535 bytes. Therefore, such attacks are not currently affecting any cloud system layers. second defense mechanism is needed, which is conIguring the S operating systems in the PaaS layer so that there is no response to the ICMP packets sent to the IP broadcast addresses. D. Smurf attack limitation. Performing a check of the aray bounds is a second Intenet Control Message Protocol (lCMP) echo requests. be J � .. (123.12.1.3) .." ---=---� h"<::= ..------/ (123.12.1.2) Packet size 90,000 bytes Attacker (196.15.10.5) Bufer overlow attack Server (123.12.1.1) In a buffer overlow attack, the attacker sends an executable Figure 5. code to the victim in order to take advantage of buffer overlow vulnerability. As a result, the victim's machine will conrolled by the attacker. The attacker could either hm the victim's machine or use the infected machine to perform an intenal cloud-based DDoS attack. Four defense mechanisms to prevent buffer overlow vulnerability can be used in the SaaS layer [10]. Ping of death attack be . Land attack This attack uses the "Land.c" program to send forged TCP SN packets with the victim's IP address in the source and destination Ields, as shown in Fig. 6. In this case, the machine will receive the request rom itself and crash the system. Such an attack is prevented in recent networking devices and operating systems by dropping ICMP packets that contain the same IP address in the source and destination Ields. Consequently, there is no need for a land attack defense mechanism to be used in all layers of the cloud system. 978-1-908320-13/1/$25.00©2013 IEEE 69 However, the process of checking and dropping lrge amounts of ICMP requests could affect the resources of the victim's - Filtering mechnism in the IaaS layer - Not reliable due to the limited use of this method - Firewall mechanism in the IaaS layer - May afect the performance of the networking system in the cloud - Active monitoring mechanism in the laaS layer [9] - Decreases resource performance in the cloud machine in the PaaS layer or the networking resources in the IaaS layer. Victim (123.12.1.1) Figure 6. G. Land atack Smurf atack - Coniguring virtual machines in the PaaS layer Extenal Internal - Coniguring network resources in the IaaS layer Teardrop attack This kind of attack uses the "Teardrop.c" program to send - Preventing when writing source code mechanism in the SaaS layer [10] invalid overlapping values of IP ragments in the header of TCP packets. As a result, the victim's machine within the cloud system will crash in the re-assembly process. Recent operating systems and network resources can handle such attacks. - Performing the array bounds checking mechnism in the SaaS layer [10] Therefore, teardrop attacks no longer affect any layers of cloud computing. IV. Bufer overlow SUMMARY OF CLOUD-BASED DDoS ATTACK Extenal Internal - Runtime instrumentation mechanism in the SaaS layer [10] Based on an investigation of the major types of DDoS attacks, we derive a taxonomy of cloud-based DDoS attacks, as illustrated in Table l. Several taxonomies of DDoS attacks - Analyzing the static nd dynamic code mechanism in the SaaS layer [10] exist [4] [12] [13]. Our classiication is focused on cloud computing aspects, such as a cloud-based type of attack, recommended practical defense mechanisms, and the drawbacks of each defense mechanism. TABLET. Attack IP spooing SYN looding TYPES OF DDoS ATTACKS ON T HE CLOUD SYSTEM C1oudbased type Recommended Practical Defense Mechanism - Hop Count Filtering (HCF) in the PaaS layer [5] - The atacker cn build his own IP2HC mapping to avoid HCF - Trust-based approach in the laaS layer [6] - Another compatible solution should be proposed to detect IP spooing in distribution routers Extenal Internal Extenal Internal Drawback - SYN cache approach in the PaaS layer [8] - Increase in latency - SYN cookies defense approach in the PaaS layer [8] - Lowers the performance of the cloud system - Reducing the time of SYN-received in the PaaS layer - Some of the legitimate ACK packets could be lost - Time consumption Ping of death Land.c Teardrop.c - Diicult to afect any layers of the cloud system currently, but the atack could be developed in the future Extenal Internal - Diicult to afect any layers of the cloud system currently, but the atack could be developed in the future Extenal Internal - Diicult to afect any layers of the cloud system currently, but the atack could be developed in the future Extenal Internal V. CONCLUSION DDoS attacks are curently a major threat and work against the availability of cloud services. With each developed defense mechanism against DDoS attacks, an improved attack appears. Defense mechanisms to protect against DDoS attacks are not always effective on their own. Combining different mechanisms to build hybrid defense mechanisms, in particular 978-1-908320-13/1/$25.00©2013 IEEE 70 with different cloud computing layers, is highly recommended. It is exremely important to investigate the effects of these different types of DDoS attacks on the cloud system. In this paper, historical examples of DDoS attacks have been presented. We also investigated the effect of different types of DDoS attacks on the cloud environment. Finally, we analyzed and identiied recommended defense mechanisms against DDoS attacks in cloud-based systems. ACKNOWLEDGMENT This work was partially supported by King Abdulaziz University through the Cultural Bureau of Saudi Arabia in Canada. This support is greatly appreciated. REFERENCES [I] J. Nazario, "DDoS attack evolution, " Network Security, vol. 2008, no. 7, pp. 7-10, 2008. [2] P. G. Neumann, "Inside Risks: denial-of-service attacks, " Commun. ACM, vol. 43, no. 4, p. 136, Apr. 2000. [3] D. Ditrich, 1. Mirkovic, P. Reiher, and S. Dietrich, Internet Denial of Service: Attack and Defense Mechanisms. Pearson Education, 2004. [4] C. M. Patel nd V. H. Borisagar, "Survey On Txonomy Of Ddos Attacks With Impact And Mitigation Techniques, " International Journal of Engineering Research & Technology (IJERT), vol. I, no. 9, pp. 1-8, 2012. [5] H. Wang, C. Jin, nd K. G. Shin, "Defense Against Spoofed IP Traic Using Hop-Count Filtering, " IEEE/ACM Transactions on Networking, vol. 1 5, no. I, pp. 40-53, Feb. 2007. [6] [7] 1. M. Gonzalez, M. Anwar, and J. B. D. Joshi, "A trust-based approach against IP-spooing attacks, " 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 63-70, Jul. 2011. M. Kumar, A. Panwar, nd A. Jain, "An Analysis of TCP SYN Flooding Attack and Defense Mechanism, " International Journal of Engineering Research & Technology (lJERT), vol. I, no. 5, pp. 1-6, 2012. [8] J. Lemon, "Resisting SYN lood DoS attacks with a SYN cache, " in Proceedings of the BSD Conference 2002 on BSD Conference, 2002, p. 10. [9] C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spaford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP, " Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp. 208-223, 1997. [10] D. Fu and F. Shi, "Bufer Overlow Exploit nd Defensive Techniques, " 2012 Fourth International Conference on Multimedia Information Networking and Security, pp. 87-90, Nov. 2012. [II] L. F. Capretz and F. Ahmed, "Why do we need personality diversity in sotware engineering?, " ACM SIGSOFT Sotware Engineering Notes, vol. 35, no. 2, pp. I-II, Mar. 2010. [12] A. Keshariya and N. Foukia, "DDoS Defense Mechanisms: A New Taxonomy, " in Data Privacy Mnagement and Autonomous Spontaneous Security SE - 17, vol. 5939, J. Garcia-Alfaro, G. Navarro­ Arribas, N. Cuppens-Boulahia, nd Y. Roudier, Eds. Springer Berlin Heidelberg, 2010, pp. 222-236. [13] S. M. Specht and R. B. Lee, "Distributed denial of service Taxonomies of atacks, tools, and countermeasures, " in Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004, pp. 543-550. 978-1-908320-13/1/$25.00©2013 IEEE 71