Top Banner
DDoS Attack in Cloud Computing 2010. 10. 11 B. Cha
14

DDoS Attack in Cloud Computing

Feb 24, 2016

Download

Documents

Hoshi

DDoS Attack in Cloud Computing. 2010. 10. 11 B. Cha. Agenda. DDoS Attacks 과 DDoS defense 분류 Scenarios of DDoS Attacks in Cloud Computing Attacks using Clod Computing Defense in Cloud Computing Target in Eucalyptus Sign of Attacks in Cloud Computing - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: DDoS  Attack in Cloud Computing

DDoS Attack in Cloud Computing2010. 10. 11

B. Cha

Page 2: DDoS  Attack in Cloud Computing

Agenda• DDoS Attacks 과 DDoS defense 분류 • Scenarios of DDoS Attacks in Cloud Computing

– Attacks using Clod Computing– Defense in Cloud Computing– Target in Eucalyptus– Sign of Attacks in Cloud Computing

• Anomaly Detection in Cloud Computing– Proposed Multistage DDoS Attack Detection – Monitoring– Lightweight Anomaly Detection

• Coarse-grained data • Bayesian Method• Triggered

– Focused Anomaly Detection• STM• LTM

Page 3: DDoS  Attack in Cloud Computing

DDoS Attack 분류

Page 4: DDoS  Attack in Cloud Computing

DDoS Attack 분류

Page 5: DDoS  Attack in Cloud Computing

DDoS defense 분류

Page 6: DDoS  Attack in Cloud Computing

Malicious Client

Services

Node ControllersClC & CC

DDoSAttacks

Leases Re-

sources

Legacy Target System

Node ControllersClC & CC

Cloud Sys-tem

(B)

(C)

(A)

DDoS Attacks using Cloud Comput-ing

Node ControllersClC & CC

Assumption: 1. Private Clouds

Normal Manager

Page 7: DDoS  Attack in Cloud Computing

Malicious Client

Services

Node ControllersClC & CC

DDoSAttacks

Leases Re-

sources

Legacy System

Node Con-

trollers

Cloud Con-

troller

Target Cloud Sys-

tem

DDoS Attacks using Cloud Comput-ing

(B)

(C)

(A)

Node ControllersClC & CC

ClusterCon-

troller

(1) (2)

Normal Manager

Page 8: DDoS  Attack in Cloud Computing

Node ControllersClC & CC

Cloud Sys-tem

(C)

Malicious Client

ServicesDDoS

Attacks

Leases Re-

sources

Legacy System

Defense in Cloud Computing

(B)

Node Con-

trollers

Cloud Con-

troller

Target Cloud Sys-

tem

(A)

ClusterCon-

troller

(1)(2) (3)Normal Client

Normal Manager

Page 9: DDoS  Attack in Cloud Computing

Node ControllersClC & CC

Cloud Sys-tem

(C)

Malicious Client

Services

Service Re-

quest

Leases Re-

sources

Legacy System

Defense in Cloud Computing

(B)

Node Con-

trollers

Cloud Con-

troller

Target Cloud Sys-

tem

(A)

ClusterCon-

troller

(2)

Malicious Man-ager

External Moni-tor

Used Resources Amount in aspect of availability

(1)

Elastics Forces(Fatigue) Measurement

in DDoS attacks

Page 10: DDoS  Attack in Cloud Computing

EC2ools

CLC Users, Key-pairs, Image Metadata

SC

S3 Tools

Walrus

CC

NC

SC CC

NC

Cluster A

Cluster B

Front-end Node

Each Node

Client 1

Target in Eucalyptus

Page 11: DDoS  Attack in Cloud Computing

Source System

Target Cloud System

DDoS AttackiTG

jSRC

Traf -fic

Src

jSRC

Traf -fic

Tg

iTG

TimeTg XT

Time

XT

Traf -fic

Traf -fic

Cloud Burst Attack

(a)

(b)

Time

(1) (2)

Sign of Attacks in Cloud Computing

Tg XT

Coarse-grained Data

Fine-grained Data

Prior & Poste-rior Prob.

Page 12: DDoS  Attack in Cloud Computing

Multistage DDoS Attack Detection• Multistage DDoS Attack Detection

– Stage 1: Monitoring– Stage 2: Lightweight Anomaly Detection– Stage 3: Focused Anomaly Detection

• Considerations in Monitoring– Volume Data in Cloud– Monitoring Location

• Source-End• Victim-End

– Interval delta_T

• Considerations in Learning Alg.– Unsupervised Learning Alg.– Supervised or Semi-supervised Learning Alg.: Bulk Anomaly– Relation between distance based and statistical anomalies for two-dimensional

data sets

Page 13: DDoS  Attack in Cloud Computing

Multistage DDoS Attack Detection• Considerations in Lightweight Anomaly Detection

– Top List• In-bound• Out-bound

– Detection Algorithm• Entropy• Statistics Techniques• Chi-Square

– Coarse-grained data• 굵은 덩어리 -> DDoS Attacks• Fine-grained data: Normal & 임계치 결정

– Bayesian Method• 사전 확률 (Prior Probability) 과 사후 확률 (Posterior Probability)• 사후 확률은 베이즈 정리에 의해서 사전 확률과 우도 (Likelihood function)d 에 의해서 계산 가능

)()()(

)()()( TGPSRCTGL

SRCPTGPTGSRCP

SRCTGP

)()()(

)(TGP

SRCPSRCTGPTGSRCP

tconsngnormalizaiiorlikelihoodposteriortan_

Pr

Page 14: DDoS  Attack in Cloud Computing

Multistage DDoS Attack Detection• Considerations in Focused Anomaly Detection

– Interval delta_T– Time Policy

• STM(Short-Term Memory)• LTM(Long-Term Memory)

– LTM• History• Symptom of Attacks

– Scanning , Stealth Scanning• Attack Scenario• Misuse Detection Rule

Time

Stage

Interval delta_TSTM LTM

Monitoring

Lightweight AD

Focused AD

Coarse-grained data

Volume data in Cloud