Index Page Based EDoS Attacks in Infrastructure Cloud
One of the prominent attribute of cloud is pay-per-use, which can draw in the attackers to detriment the cloud users economically by an attack known as EDoS (Economic Denial of Sustainability) attack. This work identifies a novel class of attack in the ar
- PDF / 262,755 Bytes
- 14 Pages / 439.363 x 666.131 pts Page_size
- 62 Downloads / 204 Views
Abstract. One of the prominent attribute of cloud is pay-per-use, which can draw in the attackers to detriment the cloud users economically by an attack known as EDoS (Economic Denial of Sustainability) attack. This work identifies a novel class of attack in the area of EDoS attacks. Our focus is on defending the first page of any website i.e. Index Page. One of the important fact about index page attack, is that the index page of any website in this universe is available freely and even without any authentication credentials. To mitigate this attack and substantiate the difference between the legitimate and non-legitimate user, we have analyzed human behaviour of browsing and DARPA DDoS dataset. This analysis has helped us to design various models, ranging from strict to weak index page prevention models. The proposed schemes are implemented as a utility IPA-Defender (Index Page Attack Defender), which works well with minimal overhead and do not affect the legitimate users at all. Keywords: Cloud Computing, Cloud Security, DDoS, EDoS, Index page.
1
Introduction
Cloud computing refers to a new business model which provides computational resources “as a service” [1]. These resources are modelled as infrastructure (IaaS) , software (SaaS) and platform (PaaS) and form a layered structure. The business like features of cloud such as pooling and elasticity of resources, on-demand service, multi-tenancy, costing and quality of service, all together are pulling in the users from both public and private sectors towards the cloud services. Due to cloud popularity many attacks are planned to degrade its performance and make cloud service unavailable for long time results in distraction of users from using cloud services. DDoS (Distributed Denial of Service) attack is one of the major and severe attacks which cause the denial of services to the user by flooding the target server with large number of packets, such that the server gets degraded and becomes unavailable to handle the further incoming requests [2]. However, in cloud environment DDoS attack cannot take place with ease, as the availability of on-demand resources exempt the server from getting downgraded. On the other side, the cloud user is impacted economically while serving these unsought G. Mart´ınez P´ erez et al. (Eds.): SNDS 2014, CCIS 420, pp. 382–395, 2014. c Springer-Verlag Berlin Heidelberg 2014
Index Page Based EDoS Attacks in Infrastructure Cloud
383
requests from attacker. This variant attack is known as EDoS (Economic Denial of Sustainability)[3][4]. The basic intention of EDoS attacker is to make the cloud services undergo by sending fake requests and increasing the load in order to increase customers bill. The easygoingness of HTTP-GET requests pull in the attacker to go for it, even in case of slow attacks with small number of requests[5]. These slow and low attacks utilize good number of resources as well, which led to the additional unnecessary cost on user. J. Idziorek and M. Tannian [6] took Amazon EC2 pricing metrics as a reference and eval
Data Loading...