Can We Beat DDoS Attacks in Clouds?



Similar documents
Survey on DDoS Attack Detection and Prevention in Cloud

Survey on DDoS Attack in Cloud Environment

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics.

Detecting and Preventing DDoS Attacks in Cloud

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

DoS: Attack and Defense

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT

Load Balancing and Switch Scheduling

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Quantitative Analysis of Cloud-based Streaming Services

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Surviving DDoS. SANOG X 5 September ed.lewis@neustar.biz. 5 Sep '07, SANOG X ed.lewis@neustar.biz 1

Monitoring Performances of Quality of Service in Cloud with System of Systems

Fault-Tolerant Framework for Load Balancing System

Prediction of DDoS Attack Scheme

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A Novel Method to Defense Against Web DDoS

Discriminating DDoS Attack Traffic from Flash Crowd through Packet Arrival Patterns

A Study of Network Security Systems

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

The Risk vs. Cost of Enterprise DDoS Protection

MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks

A Senior Design Project on Network Security

A HYBRID APPROACH TO COUNTER APPLICATION LAYER DDOS ATTACKS

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

Efficient Detection of Ddos Attacks by Entropy Variation

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Concept and Project Objectives

Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Low-rate TCP-targeted Denial of Service Attack Defense

Seminar Computer Security

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Conclusions and Future Directions

Firewall Security: Policies, Testing and Performance Evaluation

How To Protect A Dns Authority Server From A Flood Attack

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Keywords Attack model, DDoS, Host Scan, Port Scan

SECURING APACHE : DOS & DDOS ATTACKS - I

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad

Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment

Economic Denial of Sustainability (EDoS) in Cloud Services using HTTP and XML based DDoS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

TLP WHITE. Denial of service attacks: what you need to know

Examining Self-Similarity Network Traffic intervals

Future Generation Computer Systems

Denial of Service Attacks and Resilient Overlay Networks

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

DDoS Confirmation & Attack Packet Dropping Algorithm in On- Demand Grid Computing Platform

Task Scheduling in Hadoop

Orchestration and detection of stealthy DoS/DDoS Attacks

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Load Balancing of Web Server System Using Service Queue Length

Application of Netflow logs in Analysis and Detection of DDoS Attacks

The Web AppSec How-to: The Defenders Toolbox

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

Fuzzy Network Profiling for Intrusion Detection

International Journal Of Engineering Research & Management Technology

Basic Queuing Relationships

Permanent Link:

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS

Distributed Denial of Service (DDoS)

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing

Policy Distribution Methods for Function Parallel Firewalls

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

Security Issues In Cloud Computing and Countermeasures

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

How To Classify A Dnet Attack

PACKET SIMULATION OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK AND RECOVERY

The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Everything you need to know about flash storage performance

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

Transcription:

GITG342 Can We Beat DDoS Attacks in Clouds? Shui Yu, Yonghong Tian, Song Guo, Dapeng Oliver Wu IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 9, SEPTEMBER 2014 정보통신대학원 49기 정보보호 전공 최재억

Abstract A cloud usually possesses profound resources and has full control and dynamic allocation capability of its resources. Therefore, cloud offers us the potential to overcome DDoS attacks. However, individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. we propose a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers. When a DDoS attack occurs, we employ the idle resources of the cloud to clone sufficient intrusion prevention servers for the victim in order to quickly filter out attack packets and guarantee the quality of the service for benign users simultaneously. We establish a mathematical model to approximate the needs of our resource investment based on queueing theory. Through careful system analysis and real-world dataset experiments, we conclude that we can defeat DDoS attacks in a cloud environment. 2 GITG342

INTRODUCTION One essential issue of DDoS attack and defense is resource competition; if a defender has sufficient resources to counter a DDoS attack, then the attack will be unsuccessful, and vice versa Individual cloud customers (referred to as parties hosting their services in a cloud) cannot escape from DDoS attacks nowadays as they usually do not have the advantage. In this paper, we explore how to overcome DDoS attacks against individual cloud customers from the resource competition perspective. Despite the promising business model and hype surrounding cloud computing, security is the major concern for businesses shifting their applications to clouds 3 GITG342

INTRODUCTION In the early work about DDoS defense, Yau et al. treated DDoS attacks as a resource management problem. Cloud service providers (CPS) usually offer cloud customers two resource provisioning plans: short-term ondemand and long-term reservation. - short-term ondemand : vulnerable to an Economic Denial of Sustainability (EDoS) attack - long-term reservation : : vulnerable to DDoS attack In this paper, we propose a practical dynamic resource allocation mechanism to confront DDoS attacks that target individual cloud customers. the proposed mechanism will automatically and dynamically allocate extra resources from the available cloud resource pool, and new virtual machines will be cloned based on the image file of the original IPS using the existing clone technology 4 GITG342

Contribution To the best of our knowledge, this paper is an early feasible work on defeating DDoS attacks in a cloud environment. We propose a dynamic resource allocation mechanism to automatically coordinate the available resources of a cloud to mitigate DDoS attacks on individual cloud customers. We establish a queueing theory based model to estimate the resource allocation against various attack strengths. Real-world data set based analysis and experiments help us to conclude that it is possible to defeat DDoS attacks in a cloud environment with affordable costs. 5 GITG342

DDOS ATTACK MITIGATION IN CLOUDS Nonattack scenario (Fig. 1) Attack scenario (Fig. 2): clone multiple parallel IPSs to achieve the goal Fig. 1. (a) Cloud hosted server in a nonattack scenario. (b) Cloud hosted server under DDoS attack with the mitigation strategy in place. 6 GITG342

SYSTEM MODELLING AND ANALYSIS 1. System Modelling In General input as a(t), the output as b(t), and the system function of the black box as h(t). * => convolution operation b(t) = a(t) * h(t) The Laplace transform of a(t) H(s) from h(t), B(s) be the Laplace transform of b(t), and we obtain B(s) through the following equation B(s) = A(s) H(s) B(t) using the inverse Laplace transform a(t) : the arrival distribution, h(t) : the system service distribution. In the queueing theory,our studied system can be modeled as G/G/m( general arrival distribution and general service rate distribution.) However, very complex,not have computationally attractable methods to calculate the numerical results of these models 7 GITG342

SYSTEM MODELLING AND ANALYSIS 2. Approximation of the Proposed System A few reasonable assumptions and approximations - the number of benign users is stable, the cloud is big enough and has sufficient reserved or idle resources to overcome a DDoS attack on a cloud customer. - the arrival rate to the system follows the Poisson distribution when a DDoS attack is ongoing. - the service rate of each individual IPS follows an exponential distribution, which is common in queueing analysis. To measure the performance of the system, we use average time in system of packets as a metric of QoS Tn (n stands for normal) : acceptable average time in system for packets of benign users in nonattack cases. Ta(t) : for a given time point t (a stands for attack). In case, queue Q and the original IPS or multiple IPSs. 8 GITG342

SYSTEM MODELLING AND ANALYSIS 2. Approximation of the Proposed System In order to guarantee the QoS of benign users in attack cases, Ta(t) Tn for any time point t. Function R( ) : the resource investment. x : the expected system performance, such as average time in system of requests R ( ) depends on x and time point t. => R(x, t) Minimizing the resource investment R(t) while guaranteeing the QoS for benign users in attack cases 9 GITG342

SYSTEM MODELLING AND ANALYSIS 3. Resource Investment Analysis R(x) : An executable investment function with respect to a system performance expectation x. x = < CPU;memory; IO; bandwidth> R(x) : as a linear and nondecreasing function R(x) = 0, x= 0 R(x) R(y), 0 < x y R(ax + by) = ar(x)+ b(r)y a, b R 10 GITG342

SYSTEM MODELLING AND ANALYSIS 4. System Analysis for Nonattack Cases For a web based service in nonattack cases, it is generally accepted that the arrival rate of queue Q follows the Poisson distribution the probability of k arrivals for a given time interval packet arrival rate as λ, and the service rate of the IPS as μ. utility rate or busy rate as the ratio of the arrival rate and the service rate. the probability of the system stays state πk (namely, there are k packets in the system) The probability density of the time in system for t >0. The average time spent in the IPS system 11 GITG342

SYSTEM MODELLING AND ANALYSIS 5. System Analysis for Attack M/M/m : Poisson arrival rate and multiple(m) server Attack strength as r(r 1)(where r is a real number) times of the arrival rate of nonattack cases. the arrival rate of nonattack cases as λ, an attack strength is therefore denoted as r λ the following system service rate k (k servers in service). the πk (0 k ) (the probability of k packets in the system) ρ is the system busy rate, which is defined in a multiple homogeneous server case as 12 GITG342

SYSTEM MODELLING AND ANALYSIS 5. System Analysis for Attack π0 is an important parameter in queueing analysis, and it is defined as follows in the M/M/m model. Opposite to state π0, we have πm+, which is the probability that a packet has to wait when it arrives in the system. the average time spent in the system, of servers, m, is also a factor on. In this paper, the number 13 GITG342

SYSTEM MODELLING AND ANALYSIS 5. System Analysis for Attack As previously discussed, in order to guarantee the QoS for benign users during a DDoS attack, the condition of equation has to be satisfied we have the constrain for the optimization : 14 GITG342

SYSTEM MODELLING AND ANALYSIS 5. System Analysis for Attack If equation does not hold, then it is time to invest more resources to clone one or more IPSs against the ongoing attack. a cloud has sufficient idle or reserved resources, which can be used to counter brute force DDoS attacks. the resource for one IPS as the available reserved resources of a cloud as The maximum IPSs that we can use is then In a strict sense, on top of the constrains in (23), we have to have one more constrain as follows 15 GITG342

DDOS MITIGATION ALGORITHM FOR A CLOUD When a DDoS attack is detected by the original IPS, We then clone one IPS based on the image of the original IPS, and calculate the average time in system for the current status. If, then we clone one more IPS for the filtering task. As the battle continues, and we find, then it is time to reduce one IPS and release the resources back to the cloud available resource pool 16 GITG342

PERFORMANCE EVALUATION First of all, we summarize the key statistics of DDoS attacks in a global scenario from highly referred literature We use the Amazon EC2 as an example and show the related data in Table 2. we can conclude that it is not possible to deny the service of a cloud data center as a data center possesses profound resources against the attack capability of a DDoS attack 17 GITG342

PERFORMANCE EVALUATION We counted the requests for each web site every 30 seconds for a day. We processed the data and present the number of requests in seconds in Fig. 2. Fig. 2. Requests per second for two popular web sites of a major ISPdata center. From these results, we can see that the requests for a popular web site is usually less than 10 requests per second. It is generally unwise to reserve too many idle resources as it becomes costly. For the news web site, we suppose the owner reserves resources for a maximum need of 10 requests per second. As Moore et al. indicated, the average attack rate is 500 requests or packets per second. This means a web site faces 50 times the workload of its maximum capacity. 18 GITG342

PERFORMANCE EVALUATION These results indicated that when an IPS server is heavily loaded, e.g., μ =10 (therefore, ρn 1 when λ 10), Tn increases in an exponential way. On the other hand, when the IPS server s workload is suitable, e.g., μ = 15 (therefore, ρn 2/3 when λ 10), Tn is relatively stable for various arrival rate. From this experiment, we know that the workload of an IPS should be kept within a suitable range. If it is too low, say ρn < 0.5, then we waste some capability of the system. On the other hand, if it is too high, say ρn 1, then we degrade the quality of service for benign users. Fig. 3. Average time in system against arrival rate under different service rates for nonattack cases. 19 GITG342

PERFORMANCE EVALUATION we have multiple IPS servers in this case, and the model is M/M/m. We expect a good understanding of π0 against the number of duplicated servers (m) for a given busy rate. The experiment results are shown in Fig. 4. Fig. 4. Relationship between π0 and the number of duplicated IPS servers for a given busy rate. In contrast to π0, πm+ is also important to us because it is a critical point where incoming packets have to wait for service, which is expressed in (16), and the experimental results are shown in Fig. 5. Fig. 5. Relationship between πm+ and the number of duplicated IPS servers for a given busy rate. 20 GITG342

PERFORMANCE EVALUATION In the following experiments, we set the service rate of the original IPS as μ = 10, therefore, there are three variables, λ (arrival rate for nonattack cases), r (attack strength as defined before), and m (number of duplicated IPSs), which have an impact on our results. In order to match our previous experiments, we conduct three experiments for λ =5, 7, and 9, respectively. For a given, we observe the variation of f(r,m). The results are shown in Figs. 6a, 6b, 6c, which show complete information about the metric f(r,m) 21 GITG342

PERFORMANCE EVALUATION In order to guarantee the QoS, we need to keep fðr;mþ 0, which is of more interest to us. Therefore, we repeat the three simulations and only display the f(r,m) 0 parts, as shown in Figs. 6a.1, 6b.1, 6c.1, respectively. When f(r,m) > 0, this means benign users enjoy an even better QoS than they had in nonattack cases. Figs. 6a.1, 6b.1, 6c.1 divided into two parts: the right hand part (low r and high m part) and the left hand part. Obviously, the right hand part is not what we expect because it requires a large amount of resources (represented by m) for a low attack strength case (represented by r). 22 GITG342

PERFORMANCE EVALUATION CSPs prefer to minimize their investment of resources, namely, to make sure f(r,m) 0+ any time. Based on Figs. 6a.1, 6b.1, 6c.1, we extract the critical points of f(r,m) = 0, and demonstrate them in Fig. 7. The relationship between r and m in Fig. 7 looks linear. However, this is not true. We therefore list some of the numerical results in Table 3 for readers reference. 23 GITG342

PERFORMANCE EVALUATION In order to estimate the financial cost ofmitigating DDoS attacks using our proposed strategy, we use Amazon EC2 as an example. Currently, the prices of Amazon EC2 Pricing for Standard On-Demand Instances are listed in Table 4 [29]. We suppose the legitimate traffic volume is 10 requests per second based on our real-world data set (refer to Fig. 2). At the same time, based on DDoS attack characteristics (refer to Table 1), we take the attack rate as 500 requests per second. Therefore, the attack strength is 50. Under different normal workloads (measured by busy rate), we need different numbers of duplicated IPSs to carry out the mitigation task. 24 GITG342

PERFORMANCE EVALUATION The number of duplicated IPSs can be extracted from Table 3. By combing all these parameters, we obtained a monetary cost in terms of duration of attacks as shown in Fig. 8. the rate of a repeat attack is quite low - long time DDoS attacks will expose botnets to defenders - it is hard for attackers to organize a large number of active bots to carry out lengthy attacks list some of the numerical results from Fig. 8 in Table 5. 25 GITG342

FURTHER DISCUSSION the analysis model can be further improved. the analysis model for an ongoing DDoS attack using the M/M/m model global optimization is expected. As we know, there are several parameters in the system, such as the service rate and the busy rate n for nonattack cases. These parameters have an impact on the resources we need for DDoS mitigation when an attack is ongoing we suppose the IPS system is ideal, namely, all attack packets are filtered and all benign packets go through. In practice, the false negatives and false positives of the IPS system. current clouds are distributed systems, and a cloud is usually a composite of a number of data centers. IF, out of reserved resources during a battle against a DDoS attack 26 GITG342

응용 방안 설,추석등 트래픽 증가가 예상될때 DDOS대응방안 - 2015년 설 일일 인터넷 최대사용량 : 1,066Mbps 1950 975 1081 830 1066 877 757 500 637 436 0 '14년 설 최대'14년 추석 최대2. 17(D-2) 2. 18(D-1) 2. 19(D) 2. 20(D+1) 2. 21(D+2) 2. 22(D+3) 구 분 홈페이지 로드 플러스 스마트폰 앱 2.17( 화) (D-2) 2.18( 수) (D-1) 2.19( 목) (D) 2.20( 금) (D+1) 2.21( 토) (D+2) 2.22(일) (D+3) 비 고 99 66 56 53 61 58 최대 99 (38,060) (19,055) (17,688) (16,468) (15,083) (12,051) 평균 (19,734) 145 117 99 86 88 55 최대 145 (52,565) (42,946) (49,973) (40,248) (30,381) (11,921) 평균 (38,006) 523 877 552 314 530 305 최대 877 (1,781,4 22) (2,054,5 59) (2,625,1 20) (2,050,69 2) (1,554,0 68) (528,930) 평균 (1,766,465) 27 GITG342