DDoS defense system for web services in a cloud environment

https://doi.org/10.1016/j.future.2014.03.003Get rights and content

Highlights

  • Reported DoS vulnerabilities in web services are analyzed and confirmed.

  • The impact of exploiting these application-layer vulnerabilities is devastating.

  • An adaptive HTTP and XML inspecting defense system with minimal overhead is proposed.

Abstract

Recently, a new kind of vulnerability has surfaced: application layer Denial-of-Service (DoS) attacks targeting web services. These attacks aim at consuming resources by sending Simple Object Access Protocol (SOAP) requests that contain malicious XML content. These requests cannot be detected on the network or transportation (TCP/IP) layer, as they appear as legitimate packets. Until now, there is no web service security specification that addresses this problem. Moreover, the current WS-Security standard induces crucial additional vulnerabilities threatening the availability of certain web service implementations. First, this paper introduces an attack-generating tool to test and confirm previously reported vulnerabilities. The results indicate that the attacks have a devastating impact on the web service availability, even whilst utilizing an absolute minimum of attack resources. Since these highly effective attacks can be mounted with relative ease, it is clear that defending against them is essential, looking at the growth of cloud and web services. Second, this paper proposes an intelligent, fast and adaptive system for detecting against XML and HTTP application layer attacks. The intelligent system works by extracting several features and using them to construct a model for typical requests. Finally, outlier detection can be used to detect malicious requests. Furthermore, the intelligent defense system is capable of detecting spoofing and regular flooding attacks. The system is designed to be inserted in a cloud environment where it can transparently protect the cloud broker and even cloud providers. For testing its effectiveness, the defense system was deployed to protect web services running on WSO2 with Axis2: the defacto standard for open source web service deployment. The proposed defense system demonstrates its capability to effectively filter out the malicious requests, whilst generating a minimal amount of overhead for the total response time.

Introduction

During a denial-of-service (DoS) attack, the attacker tries to overload the victim’s resources, resulting in a reduced or denied service for legitimate users who are trying to access the victim’s services. In a distributed case, the attacker recruits zombies1 by infecting numerous machines across the Internet, creating a botnet. These distributed botnets can be used to drastically multiply the strength of the attack.Moreover, it makes it difficult to filter out malicious sources and hides the true identity of the attacker orchestrating the assault. These distributed denial-of-service (DDoS) attacks are one of the most devastating and realistic cyber threats today, as they can effectively ruin the service, profits and reputation of any organization operating through the Internet. Furthermore, specific knowledge of the victim’s infrastructure is hardly necessary. Botnets can therefore easily be re-targeted at a new victim with a minimum of effort.

With the rise of cloud computing and web services, even more dependency is put on the security and availability of resources accessible over the Internet  [1]. It is crucial that services remain operational, making them an attractive target for attackers. Additionally, Economic Denial-of-Sustainability (EDOS) introduces an additional motive: these are attacks which aim at consuming resources to drive up the cost of cloud computing  [2].

Recently, a new kind of vulnerability has surfaced: application layer denial-of-service (DoS) attacks targeting web services. These attacks aim at consuming resources by sending SOAP requests that contain malicious content. Generally, they target the possible heavy resource demands induced by a request to a web service. The malicious requests cannot be detected on the TCP/IP layer, as they appear as legitimate packets.

The current security specifications for web services, such as WS-Security, do not consider the problem of availability. They only address confidentiality, integrity and authorization. Moreover, these specifications themselves introduce additional weaknesses for application layer DoS attacks. It is clear that a new kind of defense system has to be designed to counter this type of attack.

As described in  [3] we can distinguish between two major DoS threats against web services on the application layer: HTTP and XML attacks.

  • XML attacks target web services that communicate through XML documents. SOAP mostly uses XML for passing data between the client and server. Attackers construct malformed XML requests and send these to the web service. Even a single malformed request might be extremely resource intensive to process. Hence, the attacker can cause considerable harm with a minimum amount of resources.

  • An HTTP attack is very rudimentary: the attacker floods a web service with non-specific HTTP requests. As the web service tries to process all requests and the particular service requires heavy use of resources, a denial-of-service is easily achieved.

This paper proposes a system for defending against these two types of application layer threats. However, it must be made clear that the proposed defense system is specific for threats involved with web service deployment. It does not replace the lower-layer DDoS defense systems that target network and transportation attacks. Therefore, for complete protection, it is recommended that such a defense mechanism precedes the proposed system.

Section snippets

Related work

Jensen et al.  [4] conducted a thorough research on the vulnerabilities in the current SOAP specifications and frameworks. Several of these attacks target the availability of the web service, such as coercive parsing, oversize payload, oversize cryptography and attack obfuscation. Furthermore, the paper provides several possible counter measures. One of the most prominent suggestions is the use of a stream-based XML parser such as SAX  [5]. Originally, Document Object Model (DOM) parsers were

Attacks

First, an overview of all regarded attacks is given. Second, an attack-generating tool is presented. It is able to test the regarded attacks on a web service implementation, Axis2 in this case. Finally, the confirmed vulnerabilities are discussed.

Architecture

The following section discusses the architecture involved in implementing the proposed defense system in a cloud environment. First, the cloud architecture without any defense system is reviewed. Then, the secure architecture is introduced.

Filter design

The core concept of the filter is to determine a normal usage profile for each web service or web service operation. This profile is represented by Gaussian models, defined by means and standard deviations of several features, such as content-length, number of elements, nesting depth, longest element, attribute and namespace. These models are based on datasets constructed from the logged features of previous requests. Using these models, outliers can be detected to distinguish abnormal requests

Experimental setup

The experimental setup deployed in the Cloud Resource Broker (CRB) is shown in Fig. 5. The CRB is installed on a server with 4 CPUs; each CPU has a Quad Core Processor with 2 GHZ processor speed, 16 GB RAM memory and Cent OS 5.5 as the operating system. The hardware details of the Cloud resources configured in the Anna University Campus are shown in Table 2.

The eucalyptus 2.0.3 middleware is installed for managing the Cloud resources. The Eucalyptus based Cloud resources are configured with

Conclusion

It is clear that application-layer vulnerabilities impose an enormous risk for the availability of web services. The tested attacks have proven to clog up a web server with a minimum amount of attack resources. A distributed attack is not even necessary, as a single machine and even a single request have proven to successfully execute a denial-of-service attack.

To mitigate this risk, a defense system is proposed and implemented. The system tests concluded that it is effective at detecting and

Future work

Further integration into the cloud environment must be investigated. Now, the system has only been implemented to protect the cloud broker. The low overhead might enable it to be used to protect all web servers. Additionally, the use of a shared, distributed dataset, or even common models should be considered to improve the scalability and the effectiveness of the system deployed in a distributed environment. Furthermore, adjustment of the α parameter, according to the gathered training data

Acknowledgments

I, Thomas Vissers, would like to thank the people from The Centre for Advanced Computing Research and Education (CARE) at Anna University for making this research possible. Furthermore, I would like to express my gratitude towards Karthikeyan Panneerselvam, Avinash Nidhi and Shyam Narayan for their invaluable hospitality, and towards family and friends for their support.

We thank the reviewers for their valuable comments.

Thomas Vissers is a Master of Applied Engineering: Electronics—ICT at the Artesis University College Antwerp, Belgium. For his Masters thesis, he conducted research at the Centre for Advanced Computing Research and Education (CARE) at Anna University, India. Recently, he started working as a security researcher at Distrinet, KU Leuven.

References (24)

  • A. Chonka et al.

    Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

    J. Netw. Comput. Appl.

    (2011)
  • P. Varalakshmi et al.

    Thwarting DDoS attacks in grid using information divergence

    Future Gener. Comput. Syst.

    (2013)
  • A.S. Nitin Singh Chauhuan

    Crypthography and cloud security challenges

    CSI Commun.

    (2013)
  • B. Cha et al.

    Study of multistage anomaly detection for secured cloud computing resources in future internet

  • M. Jensen et al.

    A survey of attacks on web services

    Comput. Sci.-Res. Dev.

    (2009)
  • About SAX, Apr. 2004. [Online]. Available:...
  • D. Sosnoski, Java web services: Metro vs. Axis2 performance, Jan. 2010. [Online]. Available:...
  • N. Gruschka et al.

    Protecting web services from DoS attacks by SOAP message validation

    Secur. Priv. Dyn. Environ.

    (2006)
  • C.I. Pinzón et al.

    S-MAS: an adaptive hierarchical distributed multiagent architecture for blocking malicious SOAP messages within web services environments

    Expert Syst. Appl.

    (2010)
  • I. Siddavatam et al.

    Comprehensive test mechanism to detect attack on web services

  • E. Menahem, A. Schclar, L. Rokach, Y. Elovici, Securing your transactions: detecting anomalous patterns in XML...
  • A. Mohamed Ibrahim, L. George, K. Govind, S. Selvakumar, Threshold based kernel level HTTP filter (TBHF) for DDoS...
  • Cited by (62)

    • Distributed denial of service attack detection in E-government cloud via data clustering

      2022, Array
      Citation Excerpt :

      Due to these features, the DDoS attack covers not only traditional networks but also a network of higher technologies. Since DDoS attacks can occur in different layers of the Internet, including the cloud, methods of countering attacks must be designed and used in separate layers [4,35]. The working principle of the protection mechanism of each layer is different.

    • Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN

      2022, Computer Communications
      Citation Excerpt :

      Also, there are several proposed simulation platforms to measure and analyze the impact of EDOS attacks on CCE. To detect traffic anomaly and defend new types of DDoS attacks, there are multiple approaches, statistical anomaly detection [28–37], artificial intelligence-based approach [38–40], data mining approach [41–45], machine learning-based approach [46,47], classifiers-based [48–53], signature-based [54–57] and hybrid anomaly detection [58–66]. A comparative summary of all the approaches is shown in Table 1 and based on the comparison, statistical anomaly detection is used in this research.

    • Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions

      2021, Computer Science Review
      Citation Excerpt :

      After confirmation that DDoS attack has been detected is received, the packets are discarded. Vissers et al. [103] have stated that attacks on web service consume resources by forwarding SOAP requests that contain malicious XML content like oversized XML document, oversized encryption, deeply nested XML structures, spoofed Reply To and Fault To addresses. The defence mechanism consists of a filter in the cloud architecture for HTTP header inspection and XML content inspection.

    View all citing articles on Scopus

    Thomas Vissers is a Master of Applied Engineering: Electronics—ICT at the Artesis University College Antwerp, Belgium. For his Masters thesis, he conducted research at the Centre for Advanced Computing Research and Education (CARE) at Anna University, India. Recently, he started working as a security researcher at Distrinet, KU Leuven.

    Thamarai Selvi Somasundaram is working as Professor and Dean in MIT Campus, Anna University, Chennai, India. She received her Ph.D. in Computer Science and Engineering in Manonmaniam Sundaranar University, Tirunelveli. Her area of interest includes Artificial Intelligence, Neural Networks, Grid Computing, Grid Scheduling, Semantic Technology, Virtualization and Cloud Computing. She is the Principal Investigator for the CARE project funded by Department of Information Technology, Ministry of Communication and Information Technology, New Delhi. She is the reviewer for Future Generation Computing Systems (FGCS), Journal of Grid Computing, Journal of Parallel and Distributed Computing, Transactions on Mobile Computing and IEEE Transactions on Data and Knowledge Engineering.

    Luc Pieters is a professor of communication networks and head of the department of Applied Engineering: Electronics—ICT at the Artesis University College Antwerp, Belgium. He completed his civil engineer studies in electronics at the VU Brussel in 1975. In the initial phase of the IMEC he took part in the training of chip designer. He obtained a special degree in informatics at the VU Brussel in 1984. He was also a member of the Academic Staff of the Postacademic Programme Telecommunications and Telematics at the University of Antwerp. He organized a 12 weeks TACIS training session for staff members of MMT in Moscow. He was coordinator–contractor of a Tempus project that enhanced the post-academic degree for telecom engineers at the Tashkent Electrotechnical University of Telecommunications.

    Kannan Govindarajan has received the B.E. degree in Information Technology from Bharathidasan University. He has completed his M.S. (By Research) degree in computer science and engineering from Anna University, Chennai in the area of Grid Scheduling in Virtualized Grid Environment. He is currently doing his Ph.D. at Anna University. He has seven years of research and development experience. His area of interest includes Grid Computing, Grid Scheduling, Semantic Technology, Virtualization and Cloud Computing. He is currently working as a Senior Research Associate in CARE, MIT Campus, Anna University. In 2012, he had been invited to visit Athabasca University, Canada, for research interaction and development.

    Peter Hellinckx obtained his Master in Computer Science and his Ph.D. in Science both from the University of Antwerp in 2002 and 2008, respectively. His master thesis acted on the interpretation of 2D sketches. His Ph.D. was titled ”The evolution towards Desktop Grid systems, problems and solutions”. In 2009 he joined TERA-Labs at the Karel de Grote University College where he became a senior researcher and responsible for the distributed computing research group. In 2013 he became a professor with the faculty of applied engineering (Electronics-ICT) at the University of Antwerp and joined CoSys-Lab. Here he is responsible for the distributed computing research team.

    View full text