ATTACKS ON CLOUD COMPUTING. Nadra Waheed



Similar documents
Securing Cloud From Ddos Attacks Using Intrusion Detection System In Virtual Machine

Preventing Cloud System from XML and HTTP DDoS Attack by Using Comber Approach via XDetector

DDOS Attacks Detection and Prevention with Cloud Trace Back

Firewalls and Intrusion Detection

Cloud Security Countermeasures against Distributed Denial of Service Attacks

Distributed Denial of Service Attacks & Defenses

A Novel Packet Marketing Method in DDoS Attack Detection

Network Security Demonstration - Snort based IDS Integration -

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

SECURING APACHE : DOS & DDOS ATTACKS - I

Announcements. No question session this week

CS 356 Lecture 16 Denial of Service. Spring 2013

Survey on DDoS Attack Detection and Prevention in Cloud

Survey on DDoS Attack in Cloud Environment

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Denial of Service. Tom Chen SMU

Denial of Service Attacks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 27 th March 2015

Packet-Marking Scheme for DDoS Attack Prevention

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Large-Scale IP Traceback in High-Speed Internet

Strategies to Protect Against Distributed Denial of Service (DD

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

A Survey on Methods to Defend against DDoS Attack in Cloud Computing

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Gaurav Gupta CMSC 681

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

Abstract. Introduction. Section I. What is Denial of Service Attack?

Yahoo Attack. Is DDoS a Real Problem?

SECURING APACHE : DOS & DDOS ATTACKS - II

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Denial Of Service. Types of attacks

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Distributed Denial of Service (DDoS)

PACKET SIMULATION OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK AND RECOVERY

Modern Denial of Service Protection

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

How To Defend Against A Distributed Denial Of Service Attack (Ddos)

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Secure Software Programming and Vulnerability Analysis

DDoS Protection Technology White Paper

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

DDoS Attacks & Mitigation

Protecting Mobile Devices From TCP Flooding Attacks

Complete Protection against Evolving DDoS Threats

Denial of Service Attacks

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

A Critical Investigation of Botnet

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks

Lecture 02b Cloud Computing II

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Content Distribution Networks (CDN)

Cisco Application Networking for IBM WebSphere

Frequent Denial of Service Attacks

DoS: Attack and Defense

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

Characterization and Analysis of NTP Amplification Based DDoS Attacks

Chapter 11 Cloud Application Development

Security: Attack and Defense

Security of IPv6 and DNSSEC for penetration testers

SANE: A Protection Architecture For Enterprise Networks

How To Classify A Dnet Attack

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Denial of Service (DoS)

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

A Layperson s Guide To DoS Attacks

Security Issues In Cloud Computing and Countermeasures

Cisco Application Networking for BEA WebLogic

NIST s Guide to Secure Web Services

Transcription:

ATTACKS ON CLOUD COMPUTING 1 Nadra Waheed

CONTENT 1. Introduction 2. Cloud computing attacks 3. Cloud TraceBack 4. Evaluation 5. Conclusion 2

INTRODUCTION Today, cloud computing systems are providing a wide variety of services and interfaces to enable vendors to rent out spaces on their physical machines at an hourly rate for a tidy profit. The services that are provided by these vendors can vary from dynamically virtual machines to flexible hosted software services. 3

INTRODUCTION With the emergence of cloud computing, multibillion dollar organizations like IBM, Amazon, Google and Ebay have already invested in cloud technology. Threats Extortionists Using DDoS attack to exhaust server resources Competitors Using known vulnerabilities to interrupt services Distributed Denial of Service (DDoS) attack, which means many nodes systems attacking one node all at the same time with a flood of messages 4

INTRODUCTION The DDos Attack Tools complex Agobot Mstream Trinoo Simple Extensible Markup Language (XML) based Denial of Service (X-DoS) Hypertext Transfer Protocol (HTTP) based Denial of Service (H-DoS) 5

INTRODUCTION X-DoS Coercive Parsing attack Open xml tags Exhaust CPU usage H-DoS Using HTTP Flooder starts up 1500 threads send randomized HTTP requests to the victim web server exhaust victim s communication channels 6

INTRODUCTION Cloud TraceBack, CTB service-oriented traceback architecture to defend against X-DoS attacks the area of cloud computing. H-DoS attack affected Iran using the attack as an example of bringing down a cloud system train our back propagation neural network called Cloud Protector Cloud Protector back propagation neural network 7

Cloud computing attacks Two security areas VM vulnerabilities Message integrity 8

Cloud computing attacks Service-oriented traceback architecture, SOTA A web security service application Apply a SOA approach to traceback methodology Identify a forged message identity Using ID field and reserved flag within the IP header 9

Cloud computing attacks DPM methodology As each incoming packet enters the edge ingress router it is marked. The marked packets will remain unchanged as they traverse the network. Outgoing packets are ignored *http://www.ixiacom.com/images/library/test_plans/edge-router/img1.gif 10

Cloud computing attacks DPM + SOTA = SOTM by placing the Service- Oriented Traceback Mark (SOTM) within web service messages Other web security services SOTM would replace the token that contains the client identification 11

Cloud computing attacks The main objectives of X-DoS and DX-DoS Exploit a known vulnerability Flood the system with useless messages to exhaust the web server s resources Attackers who try to hide their identities. cover their crime or to bypass a known defence that is in place to prevent it. 12

Cloud computing attacks XML-based denial of service (X-DoS) attacks a network is flooded with XML messages instead of packets in order to prevent legitimate users to access network communications. X-DoS DX-DoS 13

CLOUD TRACEBACK Attackers can target Bandwidth Processing power Storages capacities of a cloud network Cloud computing limited resources has to provide a highly quality service 14

CLOUD TRACEBACK Cloud traceback description Cloud TraceBack (CTB) can be used in LAN Grid network structure CTB is made within a virtual machine Compatible Flexible Scalable 15

CLOUD TRACEBACK CTB placement within cloud system infrastructure requests place a Cloud Traceback Mark (CTBM) tag within the CTB header. CTB marks all requests to (1) Prevent attack (2) Hide server address (3) Identify request sources Edge router 16

CLOUD TRACEBACK Cloud Protector A trained back propagation neural network (NN) To help detect and filter out X-DoS messages 17

CLOUD TRACEBACK Properties and Characteristics of CTB Loosely coupled Dynamic discovery Late binding Policy based behavior 18

CLOUD TRACEBACK CTB s algebraic approach to determining path and reconstruction attacker The Path CA1 to CV R1R5R7 router victim 19

CLOUD TRACEBACK A path 20

CLOUD TRACEBACK Approaches for encoding traceback information Algebraic Coding of Paths Deterministic Path Encoding Randomized Path Encoding Edge Encoding 21

CLOUD TRACEBACK a distance field can also be introduced via the use of the time-to-live value within the packet that the message comes in. With this distance field, it simplifies path reconstruction *http://www.learn-networking.com/wp-content/oldimages/ip-header-diagram.jpg 22

EVALUATION The experiment and evaluation of CTB The simulation of how a CTB works How accurate CTB is at identifying the source of where the message comes from 23

EVALUATION HTTP DoS attack experiment and evaluation Simulate the DDoS attacks on Iran Attackers using web-based attack tools Page Rebooter IFrames Do-It-Yourself (DIY) 24

EVALUATION Experiments using CTB Dell Dimension DM501 Intel Pentium single-core CPU,3.0GHz, 2GB RAM 2300 GB SATA hard-drives. The software that was installed was.net Web Services along with VB.Net 25

EVALUATION Experiments using CTB The first group of experiments were broken up into two sections: The first section of experiments simulated X-DoS attacks against a cloud service provider The second section of the experiments is done to compare CTB against SOAP authentication and WS-Security 26

EVALUATION To simulate the success of an attack Not crash The service provider was able to trace the message source and initiate filtering procedures. Crash Assumed the service provider would restart services. Access CTB reconstruction and find the source of the attack. Filtering of the X-DoS traffic is left to the experiments and evaluation section of the Cloud Protector. 27

EVALUATION With or without header? The establishment of the id attribute Use the id as the user name Storing user information Displays the information of the attacker Time id 28

EVALUATION Cloud Protector experiments The datasets were split into two groups a training set (1000 data points) a test set (1000 data points). the Cloud Protector will firstly be trained with the trained dataset and then tested against the test dataset. Cloud Protector for X-DoS attacks Cloud Protector for H-DoS attacks 29

CONCLUSION Trace and Protect CTB can be used in an actual X-DoS attack trace the attack back to the source. our results showed that CTB is able to find the source of an attack within a matter of seconds Cloud Protector a neural network that was trained to detect and filter X- DoS attacks. the result we achieved was around 98 99% of the attack traffic within an average of 10 135 ms. 30

REFERENCES: http://www.beknowledge.com/wpcontent/uploads/2010/10/eccbccloud-security-defence-to-protectcloud-computing-against-http-dos-and-xml-dosattacks_(pub_year)_journal-of-network-and-computer- Applications.pdf http://dro.deakin.edu.au/eserv/du:30018209/zhouprotectingwebservices-2008.pdf http://en.wikipedia.org/wiki/homomorphic_encryption http://articles.latimes.com/2011/jun/17/business/la-fi-cloud-security- 20110617 http://www.ists.dartmouth.edu/docs/hannacloudcomputingv2.pdf https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf http://www.zdnet.com/news/cryptography-experts-debate-cloudcomputing-risks/290726 http://www.cs3-inc.com/images/attack.gif 31

Quiz 32

QUESTIONS: 1- List two DDoS attack complex tools. 2- Which DoS attack affected Iran? 3- What are the two main areas need to be secured in a cloud system? 4- List three Properties and Characteristics of CTB. 33 5- Is CTB able to find the source of an attack within a matter of seconds?

ANSWERS: 1-Agobot, Mstream, Trinoo 2-H-DoS 3-VM vulnerabilities and Message integrity 4- Loosely coupled Dynamic discovery Late binding Policy based behavior 5- Yes 34

THE END 35