infinite resources to meet demand peaks.
In this paper, we present a design approach that
has as a major goal to identify a DoS/DDoS attack
against Cloud-enabled elastic applications. This
identification must be applied above the networking
layer, in order to avoid false negatives, enable web
service-based automated implementations or
different networking setups and must be based on
the single most definitive criterion: “Is the noticed
burst of requests generating the anticipated
profit?”
In order to do so, we define Key Completion
Indicators (KCIs). KCIs are checkpoints introduced
inside a cloud-enabled application and indicate the
level of completion of the external user requests in
the application value chain. Thus, KCIs can indicate
the gradual fulfilment of the path towards
revenue/value creation. The main argument is that
this progress and eventual revenue creation is the
single most definitive criterion to identify whether a
set of requests (despite their origins) corresponds to
a DoS/DDoS attack or a legitimate traffic burst,
above and beyond any metric based on networking
aspects or usage patterns. This is discussed in detail
in the Related Work section. The framework may be
integrated with an application through API calls to
an external service for the maintenance of the KCIs
state.
Each request, as it passes through the various
stages of the process that generates revenue, raises
the KCIs, thus indicating that it is a legitimate
transaction. The approach is based on the
assumption that a legitimate user will advance
through the various stages of the application, until
the point where he/she will produce revenue for the
application owner (e.g. credit card payment). An
illegitimate user or automated bot will be restricted
to a specific area of the application, without
completing the full application lifecycle.
Based on the level of these KCIs and the
proportion of seemingly legitimate requests over the
overall ones, a decision can be made as to whether
the owner should enable the elasticity policies or
not. This of course does not alleviate from the pain
of a DoS attack but the scalability effect on the cost
will be avoided. The remainder of the paper is
structured as follows. In Section 2, similar
approaches in the related field are presented, while
in Section 3 an analysis is made on the concept of
the approach. Section 4 presents requirements
necessary for the implementation of the approach
while Section 5 provides the overall conclusions
from this study and intentions for the future.
2 RELATED WORK
Elasticity is one of the main benefits of Cloud
computing. (Kranas et al, 2012) indicate the usage of
this feature in a service oriented framework manner,
to enable applications to harvest the benefits of it.
From a networking point of view, numerous works
exist for identifying patterns that are indicative of a
DoS attack. CPM (Wang,2004) uses statistical and
time series analysis at the network protocol level
(e.g. SYN flooding attack detection) in order to
abstract from application behaviour. (Kumar et al.,
2011) uses neural network classifiers in order to
filter traffic messages that are identified as DDoS
packets. The characteristics that are taken under
consideration include network level attributes such
as UDP echo packets, number of connections with
SYN errors, type of service etc. (Wang et al., 2011)
uses a fuzzy logic based system in order to evaluate
the infection of domain names and IP addresses.
(Ahmed et al., 2010) use an IP-based approach in
order to detect suspicious addresses and the change
in the traffic arrival rate.
In a different approach, QoSSoD (Mailloux et
al., 2008) caches incoming requests at a proxy and
valuates each request. Requests are then scheduled
for execution based on their perceived cost or threat.
Usage patterns are collected over time and provide a
baseline to compare current request behaviour
against nominal behaviour.
In (Pinzon,2010) a different approach is
presented in order to obtain time bounded Case-
Based reasoning conclusions for attacks on SOAP-
based web services, based on classifiers and SOAP
specific rules for determining whether a set of
requests can be categorized as malicious. (Yang et
al, 2008) investigate a credit model and flow control
policy for minimizing effects of DDoS attacks on
P2P systems including malicious nodes. The most
similar to our work is (Cheng et al, 2003), in which
an application level approach is considered that
utilizes specific API injection calls in the code in
order to check common rules regarding aspects of
DoS attack requests. However this approach also
needs detailed knowledge on the types of attacks and
their specificities.
An extensive survey on EDoS attacks and
countermeasures can be found in (Sandar and Senai,
2012). The main problem with networking
approaches is the fact that in many cases false
positives or negatives may influence the decision
process. For example, corporate gateways that mask
all their traffic to be seen as one IP may be
mistakenly interpreted for DoS attacks, if their
KeyCompletionIndicators-MinimizingtheEffectofDoSAttacksonElasticCloud-basedApplicationsBasedon
Application-levelMarkovChainCheckpoints
623